Identification of Peer-to-Peer Applications' Flow Patterns

Peer-to-peer file-sharing systems have gained tremendous popularity in the past few years. More users are continually joining such systems and more objects are being made available, seducing even more users to join. Today, the traffic generated by P2P systems accounts for a major fraction of the Internet traffic and is bound to increase. An accurate mapping of traffic to their applications can be very important for a broad range of network management and measurement tasks including traffic engineering, service differentiation, performance/failure monitoring, and security. Traditional mapping approaches have become increasingly inaccurate because many applications use non-default or ephemeral port numbers, use well-known port numbers associated with other applications, change application signatures or use traffic encryption. This paper presents a new approach, based on neural networks, that is able to identify flow patterns generated by P2P Internet applications while overcoming the limitations of existing approaches. The results obtained show that, when conveniently trained, neural networks constitute a valuable tool to identify P2P Internet applications since they are able to achieve good performance results while, at the same time, avoid the most important disadvantages presented by the other identification methods.

[1]  Ali Zilouchian,et al.  FUNDAMENTALS OF NEURAL NETWORKS , 2001 .

[2]  Renata Teixeira,et al.  Traffic classification on the fly , 2006, CCRV.

[3]  Carl G. Looney,et al.  Pattern recognition using neural networks: theory and algorithms for engineers and scientists , 1997 .

[4]  Panayiotis Mavrommatis,et al.  Identifying Known and Unknown Peer-to-Peer Traffic , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[5]  Andrew W. Moore,et al.  Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.

[6]  Matthew Roughan,et al.  Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification , 2004, IMC '04.

[7]  Martin T. Hagan,et al.  Gauss-Newton approximation to Bayesian learning , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).

[8]  António Pacheco,et al.  Using neural networks to classify Internet users , 2005, Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop (AICT/SAPIR/ELETE'05).

[9]  Andrew H. Sung,et al.  Identifying key features for intrusion detection using neural networks , 2002 .

[10]  Michalis Faloutsos,et al.  Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[11]  Michalis Faloutsos,et al.  Transport layer identification of P2P traffic , 2004, IMC '04.

[12]  Risto Miikkulainen,et al.  Intrusion Detection with Neural Networks , 1997, NIPS.

[13]  Jia Wang,et al.  Analyzing peer-to-peer traffic across large networks , 2002, IMW '02.

[14]  R. Valadas,et al.  Classification of Internet users using discriminant analysis and neural networks , 2005, Next Generation Internet Networks, 2005.

[15]  Hui Liu,et al.  A Peer-To-Peer Traffic Identification Method Using Machine Learning , 2007, 2007 International Conference on Networking, Architecture, and Storage (NAS 2007).

[16]  Krishna P. Gummadi,et al.  Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.

[17]  Michalis Faloutsos,et al.  BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.

[18]  Patrick van der Smagt,et al.  Introduction to neural networks , 1995, The Lancet.