CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Hybrid Technique to Identify Peer-to-Peer Internet Traffic

by Max Bhatia, Sakshi Kaushal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 13
Year of Publication: 2013
Authors: Max Bhatia, Sakshi Kaushal
10.5120/12946-0016

Max Bhatia, Sakshi Kaushal . A Hybrid Technique to Identify Peer-to-Peer Internet Traffic. International Journal of Computer Applications. 74, 13 ( July 2013), 21-25. DOI=10.5120/12946-0016

@article{ 10.5120/12946-0016,
author = { Max Bhatia, Sakshi Kaushal },
title = { A Hybrid Technique to Identify Peer-to-Peer Internet Traffic },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 13 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number13/12946-0016/ },
doi = { 10.5120/12946-0016 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:42:11.698906+05:30
%A Max Bhatia
%A Sakshi Kaushal
%T A Hybrid Technique to Identify Peer-to-Peer Internet Traffic
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 13
%P 21-25
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Over the past few years, Peer-to-Peer traffic has been consuming a lot of Internet traffic bandwidth and is still rising which brings great difficulties to network management. Traditional classification techniques such as port based and payload based have significant limitations. Hence, newer statistical approaches are adopted for P2P identification. P2P traffic uses both TCP and UDP protocols for communication. This paper provides a technique to identify P2P traffic, which focuses on significant TCP and UDP features and utilizes C4. 5 decision tree algorithm.

References
  1. Sen. S, Jia Wang, "Analyzing peer-to-peer traffic across large networks", Networking, IEEE/ACM Transactions on?Volume 12, Issue 2, April 2004 pp. 219–232.
  2. Li Dai, Jie Yang, Li Lin, "A comprehensive system for P2P classification", in 2nd IEEE International Conference, pp. 561-563, September 2010.
  3. Mehdi Mohammadi, Bijan Raahemi, Ahmad Akbari, Hossein Moeinzadeh, Babak Nasershari, "Genetic-based minimum classification error mapping for accurate identifying Peer-to-Peer applications in the internet traffic", Expert Systems with Applications, Vol. 38, pp. 6417-6423, June 2011.
  4. HuiLin Chu, HongBo Yi, XingMing Zhang, "A New P2P Traffic Identification Methodology Based on Flow Statistics", in 3rd IEEE International Conference, pp. 277-281, May 2011.
  5. Ram Keralapura, Antonio Nucci, Chen-Nee Chuah , "A novel self-learning architecture for p2p traffic classification in high speed networks", Computer Networks, Vol. 54, pp. 1055-1068, May 2010.
  6. A. Gerber, J. Houle, H. Nguyen, M. Roughan, S. Sen, "P2P The Gorilla in the Cable", in National Cable and Telecommunications Association (NCTA) 2003 National Show, Chicago, IL, June 8-11, 2003.
  7. S. Sen, J Wang, "Analyzing peer-to-peer traffic across large networks", in IEEE/ACM Transactions on Networking, vol. 12, no. 2, pp. 219-232, 2004.
  8. Yan H, Chiu D M, Lui J C S, "Profiling and identification of P2P traffic", Computer Networks, 2009, 53(6): 849-863.
  9. Chen W Q, Gong J, Ding W, "Identifying file-sharing P2P traffic based on traffic characteristics", The Journal of China Universities of Posts and Telecommunications, 2008, 15(4): 112-120.
  10. Mei-feng SUN, Jing-tao CHEN, "Research of Traffic characteristics for real time online traffic classification", The Journal of China Universities of Posts and Telecommunications, Computer Networks, vol. 18, no. 3, pp. 92-98, June 2011.
  11. Wei-ming Hong, "A Novel method for P2P traffic identification", Procedia Engineering, International Conference on Power Electronics and Engineering Application, vol. 23, pp. 204-209, 2011.
  12. Quinlan J R. C4. 5: Program for machine learning. San Mateo, CA, USA: Morgan Kaufman, 1993.
  13. Min-huo HONG, Ren-tao GU, Hong-xiang WANG, Yong-mei SUN, Yue-feng JI, "Identifying online traffic based on property of TCP flow", The Journal of China Universities of Posts and Telecommunications, vol. 16, no. 3, pp. 84-88, June 2009.
  14. Mei-feng SUN, Jing-tao CHEN ,"Research of Traffic characteristics for real time online traffic classification", The Journal of China Universities of Posts and Telecommunications, Comuter Networks,vol. 18, no. 3, pp. 92-98, June 2011.
  15. Chun-Nan Lu, Chun-Ying Huang, Ying-Dar Lin, Yuan-Cheng Lai, "Session level flow classification by packet size distribution and session grouping", Computer Networks, vol. 56,no. 1, pp. 260-272, Jan 2012.
  16. Nguyen, T. T. T. , Armitage, G. , "A survey of techniques for internet traffic classification using machine learning", in: IEEE Communications Surveys and Tutorials, vol. 10, no. 4, Jan 2009.
  17. Callado, A. ; Kamienski, C. ; Szabo, G. ; Gero, B. ; Kelner, J. ; Fernandes, S. ; Sadok, D. ,"A Survey on Internet Traffic Identification", in: IEEE Communications Surveys and Tutorials, vol. 11, no. 3, pp. 37-52, Aug 2009.
  18. Murat Soysal, Ece Guran Schmidt,"Machine Learning Algorithms for accurate flow based network traffic classification: Evaluation and Comparison", Performance Evaluation, vol. 67, no. 6, pp. 451-467, June,2010.
  19. A. Moore and K. Papagiannaki, "Toward the accurate identi?cation of network applications," in Proc. Passive and Active Measurement Workshop (PAM2005), Boston, MA, USA, March/April 2005.
  20. S. Sen, O. Spatscheck, and D. Wang, "Accurate, scalable in network identi?cation of P2P traf?c using application signatures," in WWW2004, New York, NY, USA, May 2004.
  21. T. Karagiannis, A. Broido, N. Brownlee, K. C. Claffy, M. Faloutsos, "Is P2P dying or just hiding", in: IEEE Global Telecommunications Conference, GLOBECOM 04, 2004.
  22. S. Sen , C. Spatscheck, D. Wang, "Accurate, scalable innetwork identification of P2P traffic using application signature", in: 13th International Conference on World Wide Web, 2004.
  23. T. Karagiannis, A. Broido, M. Faloutsos, K. C. Claffy, "Transport layer identification of P2P traffic", in: 4th ACM SIGCOMM Conference on Internet Measurement, 2004.
  24. K. Wang, S. J. Stolfo, "Anomalous payload-based network intrusion detection", in: Lecture Notes in Computer Science, Springer, Berlin, 2004.
  25. John Hurley, Emi Garcia-Palacios and Sakir Sezer, "Classification of P2P and HTTP Using Specific Protocol Characteristics", Lecture notes in The Internet of the Future, 15th Open European Summer School and IFIP TC6. 6 Workshop, EUNICE 2009, Barcelona, Spain, Proceedings, September 7-9, 2009.
  26. Wireshark, Available: http://www. wireshark. org/
  27. Weka, Available: http://www. cs. waikato. ac. nz/ml/Weka
Index Terms

Computer Science
Information Sciences

Keywords

P2P traffic identification TCP traffic UDP traffic C4. 5 decision tree