Accurate Classification of P2P Traffic by Clustering Flows

被引:0
作者
He Jie [1 ]
Yang Yuexiang [2 ]
Qiao Yong [1 ]
Tang Chuan [2 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[2] Natl Univ Def Technol, Informat Ctr, Changsha 410073, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
traffic classification; P2P; fine-grained; support vector machine;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
P2P traffic has always been a dominant portion of Internet traffic since its emergence in the late 1990s. The method used to accurately classify P2P traffic remains a key problem for Internet Service Producers (ISPs) and network managers. This paper proposes a novel approach to the accurate classification of P2P traffic at a fine-grained level, which depends solely on the number of special flows during small time intervals. These special flows, named Clustering Flows (CFs), are defined as the most frequent and steady flows generated by P2P applications. Hence we are able to classify P2P applications by detecting the appearance of corresponding CFs. Compared to existing approaches, our classifier can realise high classification accuracy by exploiting only several generic properties of flows, instead of extracting sophisticated features from host behaviours or transport layer data. We validate our framework on a large set of P2P traffic traces using a Support Vector Machine (SVM). Experimental results show that our approach correctly classifies P2P applications with an average true positive rate of above 98% and a negligible false positive rate of about 0.01%.
引用
收藏
页码:42 / 51
页数:10
相关论文
共 50 条
  • [31] Identifying P2P Applications Using Ensemble Learning and Co-Training
    Wang, Jian-Min
    Qian, Cheng-Lu
    Che, Chun-Hui
    He, Hai-Tao
    You, Fang
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (03): : 453 - 461
  • [32] Risk Control of Online P2P Lending in China Based on Health Investment
    Yang, Xi
    Fan, Wenjuan
    Wang, Lei
    Yang, Shanlin
    Wang, Wenhao
    EKOLOJI, 2019, 28 (107): : 2013 - 2022
  • [33] Application Of Clustering Algorithms In Ip Traffic Classification
    Zhou Xusheng
    Zhou Yu
    PROCEEDINGS OF THE 2009 WRI GLOBAL CONGRESS ON INTELLIGENT SYSTEMS, VOL II, 2009, : 399 - 403
  • [34] A Traffic Classification Method with Spectral Clustering in SDN
    Xiao, Peng
    Liu, Na
    Li, Yuanyuan
    Lu, Ying
    Tang, Xiao-jun
    Wang, Hai-wen
    Li, Ming-xia
    2016 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT), 2016, : 391 - 394
  • [35] Clustering Techniques for Traffic Classification: A Comprehensive Review
    Takyi, Kate
    Bagga, Amandeep
    Goopta, Pooja
    2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 224 - 230
  • [36] Accurate classification of the Internet traffic based on the SVM method
    Li, Zhu
    Yuan, Ruixi
    Guan, Xiaohong
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1373 - 1378
  • [37] Traffic Classification of User Behaviors in Tor, 12P, ZeroNet, Freenet
    Hu, Yuzong
    Zou, Futai
    Li, Linsen
    Yi, Ping
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 418 - 424
  • [38] Accurate Traffic Classification with Multi-threaded Processors
    Liu, Yizhen
    Xu, Daxiong
    Sun, Lingge
    Liu, Dong
    2008 IEEE INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING WORKSHOP PROCEEDINGS, VOLS 1 AND 2, 2008, : 478 - +
  • [39] Identification and Selection of Flow Features for Accurate Traffic Classification in SDN
    da Silva, Anderson Santos
    Machado, Cristian Cleder
    Bisol, Rodolfo Vebber
    Granville, Lisandro Zambenedetti
    Schaeffer-Filho, Alberto
    2015 IEEE 14TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2015, : 134 - 141
  • [40] A Modular Two-layer System for Accurate and Fast Traffic Classification
    Hajikarami, Fateme
    Berenjkoub, Mehdi
    Manshaei, Mohammad Hossein
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 149 - 154