Towards Cost-Effective P2P Traffic Classification in Cloud Environment

Characterization of peer-to-peer (P2P) traffic is an essential step to develop workload models towards capacity planning and cyberthreat countermeasure over P2P networks. In this paper, we present a classification scheme for characterizing P2P file-sharing hosts based on transport layer statistical features. The proposed scheme is accessed on a virtualized environment that simulates a P2P-friendly cloud system. The system shows high accuracy in differentiating P2P file-sharing hosts from ordinary hosts. Its tunability regarding monitoring cost, system response time, and prediction accuracy is demonstrated by a series of experiments. Further study on feature selection is pursued to identify the most essential discriminators that contribute most to the classification. Experimental results show that an equally accurate system could be obtained using only 3 out of the 18 defined discriminators, which further reduces the monitoring cost and enhances the adaptability of the system. key words: P2P, network monitoring, traffic classification, QoS

[1]  Aixia Guo,et al.  Gene Selection for Cancer Classification using Support Vector Machines , 2014 .

[2]  Shanqing Guo,et al.  Entropy Based Discriminators for P2P Teletraffic Characterization , 2011, ICONIP.

[3]  Youki Kadobayashi,et al.  Practical network traffic analysis in P2P environment , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[4]  Sakir Sezer,et al.  Host-Based P2P Flow Identification and Use in Real-Time , 2011, TWEB.

[5]  Min Zhang,et al.  State of the Art in Traffic Classification: A Research Review , 2009 .

[6]  John C. S. Lui,et al.  Application Identification Based on Network Behavioral Profiles , 2008, 2008 16th Interntional Workshop on Quality of Service.

[7]  Nen-Fu Huang,et al.  Early Identifying Application Traffic with Application Characteristics , 2008, 2008 IEEE International Conference on Communications.

[8]  Carey L. Williamson,et al.  A comparative analysis of web and peer-to-peer traffic , 2008, WWW.

[9]  Wolfgang John,et al.  Heuristics to Classify Internet Backbone Traffic based on Connection Patterns , 2008, 2008 International Conference on Information Networking.

[10]  Tao Ban,et al.  Monitoring and analysis of network traffic in P2P environment , 2008 .

[11]  Renata Teixeira,et al.  Early application identification , 2006, CoNEXT '06.

[12]  Michael K. Reiter,et al.  Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors , 2006, ESORICS.

[13]  Carey L. Williamson,et al.  A Longitudinal Study of P2P Traffic Classification , 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation.

[14]  Anirban Mahanti,et al.  Traffic classification using clustering algorithms , 2006, MineNet '06.

[15]  Renata Teixeira,et al.  Traffic classification on the fly , 2006, CCRV.

[16]  Sándor Molnár,et al.  Identification and Analysis of Peer-to-Peer Traffic , 2006, J. Commun..

[17]  W. Gasarch,et al.  The Book Review Column 1 Coverage Untyped Systems Simple Types Recursive Types Higher-order Systems General Impression 3 Organization, and Contents of the Book , 2022 .

[18]  Michalis Faloutsos,et al.  BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.

[19]  Mark Crovella,et al.  Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.

[20]  Michalis Faloutsos,et al.  Transport layer identification of P2P traffic , 2004, IMC '04.

[21]  Oliver Spatscheck,et al.  Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.

[22]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.