Classification of P2P and HTTP Using Specific Protocol Characteristics

被引:0
|
作者
Hurley, John [1 ]
Garcia-Palacios, Emi [1 ]
Sezer, Sakir [1 ]
机构
[1] Queens Univ Belfast, Inst Elect Commun & Informat Technol ECIT, Belfast BT7 1NN, Antrim, North Ireland
来源
INTERNET OF THE FUTURE | 2009年 / 5733卷
基金
英国工程与自然科学研究理事会;
关键词
Traffic Classification; P2P; HTTP;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A key aspect of traffic classification is the early identification of individual flows which may utilise strategies such as ephemeral ports and transport later encryption to 'hide' on the network. This paper focuses on P2P and HTTP - the two main producers of network traffic - to determine the characteristics of their individual flows. We propose a heuristic based classification system to distinguish HTTP and P2P flows using only the structure of how packets are passed and the lengths of the individual packets. The classification system is then tested on real network traffic and results presented to show it can accurately detect P2P and HTTP within the early part of a TCP flow.
引用
收藏
页码:31 / 40
页数:10
相关论文
共 28 条
  • [21] Identifying P2P Applications Using Ensemble Learning and Co-Training
    Wang, Jian-Min
    Qian, Cheng-Lu
    Che, Chun-Hui
    He, Hai-Tao
    You, Fang
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (03): : 453 - 461
  • [22] PeerRush: Mining for unwanted P2P traffic
    Rahbarinia, Babak
    Perdisci, Roberto
    Lanzi, Andrea
    Li, Kang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (03) : 194 - 208
  • [23] P2P Streaming Traffic Detection in Encrypted Tunnel
    Tseng, Chuan-Mu
    Chao, Ling-Yao
    Liu, Tzong-Jye
    2013 FIRST INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2013, : 208 - 212
  • [24] Characterizing Application Behaviors for Classifying P2P Traffic
    Wang, Dawei
    Zhang, Luoshi
    Yuan, Zhenlon
    Xue, Yibo
    Dong, Yinfei
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 21 - 25
  • [25] Secure Model for P2P File-Sharing System
    Raj, S. Vishnu
    Indhumathi, Govindaswamy
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (04): : 239 - 251
  • [26] PeerSorter: Classifying Generic P2P Traffic in Real-time
    He, Jie
    Yang, Yuexiang
    Wang, Xiaolei
    Zeng, Yingzhi
    Tang, Chuan
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 605 - 613
  • [27] Abacus: Accurate behavioral classification of P2P-TV traffic
    Bermolen, Paola
    Mellia, Marco
    Meo, Michela
    Rossi, Dario
    Valenti, Silvio
    COMPUTER NETWORKS, 2011, 55 (06) : 1394 - 1411
  • [28] A new method of P2P traffic identification based on Support Vector Machine at the host level
    Liu, Feng
    Li, Zhitang
    Nie, Qingbin
    ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS, 2009, : 579 - +