Title
Peer-to-Peer Application Recognition Based on Signaling Activity
Abstract
Because of the enormous growth in the number of peer-to-peer (P2P) applications, P2P traffic now constitutes a substantial proportion of Internet traffic. The ability to accurately identify different P2P applications from the network traffic is essential for managing a number of network traffic issues, such as service differentiation and capacity planning. However, modern P2P applications often use proprietary protocols, dynamic port numbers, and packet encryptions, which make traditional identification approaches like port-based or signature- based identification less effective. In this paper, we propose an approach for accurately recognizing P2P applications running on monitored hosts based on signaling behavior, which is regulated by the underlying P2P protocol; therefore, each application possesses a distinguishing characteristic. We consider that the signaling behavior of each P2P application can serve as a unique signature for application identification. Our approach is particularly useful for three reasons: 1) it does not need to access the packet payload; 2) it recognizes applications based purely on their signaling behavior; and 3) it can identify particular P2P applications. The performance evaluation shows that 92% of a real-life traffic trace can be correctly recognized within a 5-minute monitoring period.
Year
DOI
Venue
2009
10.1109/ICC.2009.5199305
ICC
Keywords
Field
DocType
diffserv networks,protocols,internet traffic,service differentiation,network traffic,dynamic port numbers,proprietary protocols,signaling activity,network traffic issue,peer-to-peer traffic,p2p traffic,peer-to-peer application recognition,traditional identification approach,computer network performance evaluation,internet,real-life traffic trace,p2p application,signature-based identification,application identification,performance evaluation,p2p protocol,telecommunication traffic,packet encryptions,peer-to-peer computing,capacity planning,bittorrent,support vector machine,payloads,traffic classification,cryptography,signal processing,accuracy,p2p,correlation
Traffic classification,Peer-to-peer,Proprietary protocol,Computer science,Network packet,Computer network,Capacity planning,BitTorrent,Internet traffic,The Internet
Conference
ISSN
ISBN
Citations 
1938-1883 E-ISBN : 978-1-4244-3435-0
978-1-4244-3435-0
9
PageRank 
References 
Authors
0.68
8
4
Name
Order
Citations
PageRank
Chen-Chi Wu123817.12
Kuan-Ta Chen21896136.86
Yu-Chun Chang344825.55
Chin-Laung Lei41686201.07