Classification of P2P and HTTP Using Specific Protocol Characteristics
نویسندگان
چکیده
A key aspect of traffic classification is the early identification of individual flows which may utilise strategies such as ephemeral ports and transport later encryption to ‘hide’ on the network. This paper focuses on P2P and HTTP – the two main producers of network traffic – to determine the characteristics of their individual flows. We propose a heuristic based classification system to distinguish HTTP and P2P flows using only the structure of how packets are passed and the lengths of the individual packets. The classification system is then tested on real network traffic and results presented to show it can accurately detect P2P and HTTP within the early part of a TCP flow.
منابع مشابه
Equitable Machine Learning Algorithms to Probe Over P2P Botnets
Cyber security has become very significant research area in line due to the increase in the number of malicious attacks by both state and nonstate actors. Ideally, one would like to properly secure the machines from being infected by viruses of any form. Nowadays, botnets have become an integral part of the Internet and the main drive for creating them is for financial gain. A bot conceals itse...
متن کاملProviding Incentives in P2P Adaptive Streaming
Adaptive streaming, such as Dynamic Adaptive Streaming over HTTP (DASH), has been widely deployed to provide uninterrupted video streaming service to users with dynamic network conditions. In this report, we analytically study the potential of using P2P in conjunction with adaptive streaming. Our focus is on how to provide incentives in P2P adaptive streaming. We first study P2P adaptive stream...
متن کاملHPTP: Relieving the Tension between ISPs and P2P
Measurement-based studies indicate that there is a severe tension between P2P applications and ISPs. In this paper, we propose a novel HTTP-based Peer-to-Peer (HPTP) framework to relieve this tension. The key idea is to exploit the widely deployed web cache proxies of ISPs to trick them to cache P2P traffic. This is achieved via a process we refer to as “HTTPifying”: we segment (if necessary) l...
متن کاملFile-sharing in the Internet: A characterization of P2P traffic in the backbone
Since the outbreak of peer-to-peer (P2P) networking with Napster during the late ’90s, P2P applications have multiplied, become sophisticated and emerged as a significant fraction of Internet traffic. At first, P2P traffic was easily recognizable since P2P protocols used specific application TCP or UDP port numbers. However, current P2P applications have the ability to use arbitrary ports to “c...
متن کاملMeasurement and Statistics of Application Business in Complex Internet
Owing to independent topologies and autonomic routing mechanism, the logical networks formed by Internet application business behavior cause the significant influence on the physical networks. In this paper, the backbone traffic of TUNET (Tsinghua University Networks) is measured, further more, the two most important application business: HTTP and P2P are analyzed at IP-packet level. It is show...
متن کامل