Please submit manuscripts in either of the following two submission systems

    ScholarOne Manuscripts

  • ScholarOne
  • 勤云稿件系统

  • 登录

Search by Issue

  • 2024 Vol.31
  • 2023 Vol.30
  • 2022 Vol.29
  • 2021 Vol.28
  • 2020 Vol.27
  • 2019 Vol.26
  • 2018 Vol.25
  • 2017 Vol.24
  • 2016 vol.23
  • 2015 vol.22
  • 2014 vol.21
  • 2013 vol.20
  • 2012 vol.19
  • 2011 vol.18
  • 2010 vol.17
  • 2009 vol.16
  • No.1
  • No.2

Supervised by Ministry of Industry and Information Technology of The People's Republic of China Sponsored by Harbin Institute of Technology Editor-in-chief Yu Zhou ISSNISSN 1005-9113 CNCN 23-1378/T

期刊网站二维码
微信公众号二维码
Related citation:DU Min,CHEN Xing-Shu,TAN Jun.Accurate P2P traffic identification based on data transfer behavior[J].Journal of Harbin Institute Of Technology(New Series),2012,19(4):43-48.DOI:10.11916/j.issn.1005-9113.2012.04.008.
【Print】   【HTML】   【PDF download】   View/Add Comment  Download reader   Close
←Previous|Next→ Back Issue    Advanced Search
This paper has been: browsed 2146times   downloaded 1413times 本文二维码信息
码上扫一扫!
Shared by: Wechat More
Accurate P2P traffic identification based on data transfer behavior
Author NameAffiliation
DU Min School of Computer Science, Sichuan University, Chengdu 610065, China 
CHEN Xing-Shu School of Computer Science, Sichuan University, Chengdu 610065, China 
TAN Jun School of Computer Science, Sichuan University, Chengdu 610065, China 
Abstract:
Peer-to-Peer (P2P) technology is one of the most popular techniques nowadays, and accurate identification of P2P traffic is important for many network activities. The classification of network traffic by using port-based or payload-based analysis is becoming increasingly difficult when many applications use dynamic port numbers, masquerading techniques, and encryption to avoid detection. A novel method for P2P traffic identification is proposed in this work, and the methodology relies only on the statistics of end-point, which is a pair of destination IP address and destination port. Features of end-point behaviors are extracted and with which the Support Vector Machine classification model is built. The experimental results demonstrate that this method can classify network applications by using TCP or UDP protocol effectively. A large set of experiments has been carried over to assess the performance of this approach, and the results prove that the proposed approach has good performance both at accuracy and robustness.
Key words:  P2P  support vector machine  statistical characteristic  traffic identification  feature extraction
DOI:10.11916/j.issn.1005-9113.2012.04.008
Clc Number:
Fund:

LINKS