An Adaptive Trust Sampling Method for P2P Traffic Inspection
نویسندگان
چکیده
This paper focuses on the sampling-based Deep Packet Inspection for the traffic of P2P file sharing systems, especially for BitTorrent, and proposes a logarithmic-based Adaptive Trust Sampling (ATS) strategy for P2P traffic identification. In the whole process of sampling identification for P2P traffic, the sampling ratio of the current node in a P2P network can automatically adjust and dynamically vary according to the estimator of P2P traffic ratio of historical cycles. The experimental results show that the Adaptive Trust Sampling strategy can adapt to the dynamic change of sample size, effectively reduce the total sample size, mitigate the consumptions of system resources to some extent, and achieve the purpose of P2P traffic sampling.
منابع مشابه
Providing an optimal model for gaining public trust in the Complaints System and Inspection Agency's announcements
This research seeks to provide an optimal model for gaining public trust in the Complaints System and Inspection Agency's announcements.In this research, a survey method and a researcher-made questionnaire were used. The study population was consist of customers and users of the complaint handling system and the organization's inspection reports in Mazandaran province comprising equal numbers o...
متن کاملOn the Performance of OpenDPI in Identifying P2P Truncated Flows
This paper aims to show the impact on classification accuracy and the level of computational gain that could be obtained in applying deep packet inspection on truncated peer to peer traffic flows instead of complete ones. Using one of the latest open source classifiers, experiments were conducted to evaluate classification performance on full and truncated network flows for different protocols,...
متن کاملPeerRush: Mining for Unwanted P2P Traffic
In this paper we present PeerRush, a novel system for the identification of unwanted P2P traffic. Unlike most previous work, PeerRush goes beyond P2P traffic detection, and can accurately categorize the detected P2P traffic and attribute it to specific P2P applications, including malicious applications such as P2P botnets. PeerRush achieves these results without the need of deep packet inspecti...
متن کاملSilvio VALENTI Dealing with P 2 P traffic in modern networks : measurement , identification and control
P2P applications are certainly to be counted among the most bandwidth greedy users of the Internet, due to their wide diffusion as well as the kind of service they provide (e.g. file-sharing, live-streaming). Therefore, they pose continuously renewing challenges to network operators: P2P traffic must be correctly monitored and managed in order for it to coexist peacefully with traffic of other ...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کامل