Hybrid P2P traffic classification with heuristic rules and machine learning

被引:25
作者
Ye, Wujian [1 ]
Cho, Kyungsan [1 ]
机构
[1] Dankook Univ, Dept Software Sci, Yongin, Gyeonggi Do, South Korea
关键词
P2P traffic; Hybrid classification; Signature based; Heuristic rules; Machine learning; Decision tree;
D O I
10.1007/s00500-014-1253-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Peer-to-peer (P2P) applications have become more and more popular in recent years. Although they make our lives easier, increasing P2P traffic leads to many problems in management and security. Classifying P2P traffic accurately is becoming more critical for network management and P2P malware detection. Many methods have been proposed for P2P traffic classification, such as port-based, signature-based, pattern-based, and statistics-based methods. However, with the development of anti-identification techniques from port disguise to payload encryption or even packet size controlling, a single method is not enough to classify P2P traffic accurately. In this paper, an improved two-step hybrid P2P traffic classifier is proposed. The first step is a signature-based classifier at the packet-level combined with connection heuristics. The second step consists of a statistics-based classifier and pattern heuristics, and classifies the remaining unknown traffic at the flow level. Based on the analysis of various machine learning algorithms, the statistics-based classifier is implemented with REPTree, a decision tree algorithm. Through verification with real datasets, it is shown that our hybrid scheme provides high accuracy and low overhead compared to other hybrid schemes.
引用
收藏
页码:1815 / 1827
页数:13
相关论文
共 43 条
  • [1] Abdelhalim A, 2014, INTRO SEMANTIC WEB C
  • [2] Androutsellis-Theotokis S., 2002, A survey of peer-to-peer file sharing technologies
  • [3] [Anonymous], 2009, J COMMUN
  • [4] [Anonymous], P EBISS 09
  • [5] [Anonymous], 2006, INTERNETWORKING TCP
  • [6] Badulescu LA, 2007, ANN UNIV CRAIOVA-MAT, V34, P89
  • [7] Basher N., 2008, WWW 08, P287, DOI DOI 10.1145/1367497.1367537
  • [8] PROTOCOL FOR PACKET NETWORK INTERCOMMUNICATION
    CERF, VG
    KAHN, RE
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1974, CO22 (05) : 637 - 648
  • [9] Online hybrid traffic classifier for Peer-to-Peer systems based on network processors
    Chen, Zhenxiang
    Yang, Bo
    Chen, Yuehui
    Abraham, Ajith
    Grosan, Crina
    Peng, Lizhi
    [J]. APPLIED SOFT COMPUTING, 2009, 9 (02) : 685 - 694
  • [10] Two-Step Hierarchical Scheme for Detecting Detoured Attacks to the Web Server
    Choi, Byungha
    Cho, Kyungsan
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 633 - 649