Classification of P2P and HTTP Using Specific Protocol Characteristics

نویسندگان

  • John Hurley
  • Emi Garcia-Palacios
  • Sakir Sezer
چکیده

A key aspect of traffic classification is the early identification of individual flows which may utilise strategies such as ephemeral ports and transport later encryption to ‘hide’ on the network. This paper focuses on P2P and HTTP – the two main producers of network traffic – to determine the characteristics of their individual flows. We propose a heuristic based classification system to distinguish HTTP and P2P flows using only the structure of how packets are passed and the lengths of the individual packets. The classification system is then tested on real network traffic and results presented to show it can accurately detect P2P and HTTP within the early part of a TCP flow.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Equitable Machine Learning Algorithms to Probe Over P2P Botnets

Cyber security has become very significant research area in line due to the increase in the number of malicious attacks by both state and nonstate actors. Ideally, one would like to properly secure the machines from being infected by viruses of any form. Nowadays, botnets have become an integral part of the Internet and the main drive for creating them is for financial gain. A bot conceals itse...

متن کامل

Providing Incentives in P2P Adaptive Streaming

Adaptive streaming, such as Dynamic Adaptive Streaming over HTTP (DASH), has been widely deployed to provide uninterrupted video streaming service to users with dynamic network conditions. In this report, we analytically study the potential of using P2P in conjunction with adaptive streaming. Our focus is on how to provide incentives in P2P adaptive streaming. We first study P2P adaptive stream...

متن کامل

HPTP: Relieving the Tension between ISPs and P2P

Measurement-based studies indicate that there is a severe tension between P2P applications and ISPs. In this paper, we propose a novel HTTP-based Peer-to-Peer (HPTP) framework to relieve this tension. The key idea is to exploit the widely deployed web cache proxies of ISPs to trick them to cache P2P traffic. This is achieved via a process we refer to as “HTTPifying”: we segment (if necessary) l...

متن کامل

File-sharing in the Internet: A characterization of P2P traffic in the backbone

Since the outbreak of peer-to-peer (P2P) networking with Napster during the late ’90s, P2P applications have multiplied, become sophisticated and emerged as a significant fraction of Internet traffic. At first, P2P traffic was easily recognizable since P2P protocols used specific application TCP or UDP port numbers. However, current P2P applications have the ability to use arbitrary ports to “c...

متن کامل

Measurement and Statistics of Application Business in Complex Internet

Owing to independent topologies and autonomic routing mechanism, the logical networks formed by Internet application business behavior cause the significant influence on the physical networks. In this paper, the backbone traffic of TUNET (Tsinghua University Networks) is measured, further more, the two most important application business: HTTP and P2P are analyzed at IP-packet level. It is show...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009