An Efficient P2P Traffic Identification Scheme

The increasing applications of peer to peer network consume a lot of network bandwidth and negatively impact the operations of regular services in the Internet. Therefore, it is important to identify and control the P2P traffic, and ensure the regular services can obtain enough bandwidth. In this paper, an efficient scheme to identify the P2P traffic is proposed. The scheme has two parts, one is building the rules database for identification, and the other is an efficient packet classification algorithm. The algorithm has two stages including the stage of rules storage, and the stage of packet matching. Compared with the original approaches, our method can solve the drawbacks of the previous schemes. The simulation results demonstrate that our algorithm has high accuracy, and can effectively enhance the performance of P2P traffic identification.

[1]  Putra Sumari,et al.  CUSTP: Custom Protocol for Audio and Video Conferencing System over P2P Networks , 2010, J. Digit. Content Technol. its Appl..

[2]  Michalis Faloutsos,et al.  BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.

[3]  N. Saravana Selvam,et al.  Active Network Based Queue Management for Providing QoS Using IXP 2400 Network Processor , 2010, J. Convergence Inf. Technol..

[4]  Grenville J. Armitage,et al.  A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.

[5]  Panayiotis Mavrommatis,et al.  Identifying Known and Unknown Peer-to-Peer Traffic , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[6]  Oliver Spatscheck,et al.  Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.

[7]  Sebastian Zander,et al.  A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification , 2006, CCRV.

[8]  Ruchuan Wang,et al.  A Novel P2P Traffic Identification Model Based on Ensemble Learning , 2011 .

[9]  Ruchuan Wang,et al.  P2P Replica-tree based Consistency Maintenance Strategy , 2010, J. Digit. Content Technol. its Appl..

[10]  Bo Li,et al.  On the efficiency of collaborative caching in ISP-aware P2P networks , 2011, 2011 Proceedings IEEE INFOCOM.

[11]  Jonathan S. Turner,et al.  ClassBench: A Packet Classification Benchmark , 2005, IEEE/ACM Transactions on Networking.

[12]  Yukiko Sawaya,et al.  Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics , 2011, 2011 IEEE/IPSJ International Symposium on Applications and the Internet.

[13]  Qian Wang,et al.  Modeling and Analysis of the Proactive Worm in Unstructured Peer-to-Peer Network , 2010, J. Convergence Inf. Technol..