Implementation of P2P nodes detection based on decision tree

被引:0
作者
机构
[1] Computer Network Center, Harbin Institute of Technology
[2] School of Computer Science and Technology, Harbin Institute of Technology
来源
Dong, Y.-P. | 1600年 / Editorial Board of Journal on Communications卷 / 34期
关键词
Decision tree; P2P; Traffic characteristic; Traffic identification;
D O I
10.3969/j.issn.1000-436x.2013.z2.009
中图分类号
学科分类号
摘要
A P2P nodes detection method based on decision model was proposed by a long time of observation. As this method is a statistical analysis of the transport layer packet characteristics, identification of the network node for encrypted or unencrypted P2P applications is effective. Experiment shows that this method has higher accuracy and lower false positive rate and false negative rate.
引用
收藏
页码:40 / 46
页数:6
相关论文
共 16 条
  • [1] Madhukar A., Williamson C., A longitudinal study of P2P traffic classification, Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation, pp. 179-188, (2006)
  • [2] Sen S., Spatscheck O., Accurate, scalable in-network identification of P2P traffic using application signatures, Proceedings of the 13th International Conference on World Wide Web, pp. 512-521, (2004)
  • [3] Liu X.B., Yang J.H., Xie G.G., Automated mining of packet signatures for traffic identification at application layer with apriori algorithm, Journal on Communications, 29, 12, pp. 51-59, (2008)
  • [4] Constantinous F., Mavrommatis P., Identifying known and unknown peer-to-peer traffic transport layer identification of P2P traffic, Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, pp. 93-102, (2006)
  • [5] Wang J.S., Zhang Y., Connection pattern-based P2P application identification characteristic, Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops, pp. 437-441, (2007)
  • [6] Raffaele B., Marco C., Characterizing the network behavior of P2P traffic, Proceedings of the 2008 4th International Telecommunication Networking Workshop on QoS in Multiservice IP Networks, pp. 14-19, (2008)
  • [7] Alshammari R., Zincir-Heywood A.N., Can encrypted traffic be identified without port numbers, IP addresses and payload inspection, Computer Networks, 6, 55, pp. 1326-1350, (2010)
  • [8] Dusi M., Este A., Using GMM and SVM-based techniques for the classification of SSH-encrypted traffic, Proceedings of the 2009 IEEE International Conference on Communications, pp. 702-707, (2009)
  • [9] Moore A.W., Zuev D., Internet traffic classification using bayesian analysis techniques, Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp. 50-60, (2005)
  • [10] Yuan R., Li Z., An SVM-based machine learning method for accurate internet traffic classification, Information Systems Frontiers, 12, 2, pp. 149-156, (2012)