Recent statistical studies on telecommunication networks outline that peer-to-peer (P2P) file-sharing is keeping increasing and it now contributes about 50–80% of the overall Internet traffic [1]. Moreover, more and more network applications such as streaming media, internet telephony, and instant messaging are taking a form of P2P telecommunication. The bandwidth intensive nature of P2P applications suggests that P2P traffic can have significant impact on the underlying network. Therefore, analyzing and characterizing this kind of traffic is an essential step to develop workload models towards efficient amelioration in network traffic engineering and capacity planning. In this paper, we first introduce an adaptive system for handy P2P trace capturing and analysis. By using virtualization technology, the system can efficiently organize limited resources to build a reliable and tractable network that supports adjustable experimental study and practical performance tuning. Then the proposed system is applied to traffic characterization of File Sharing P2P (FSP2P) applications. To avoid excessive computing cost of payload information inspection, we proposed a more light-weighted analytical scheme which makes use of meta features extracted from packet headers. With carefully selected system parameters, we show that satisfactory prediction accuracy on differentiating FSP2P applications from ordinary network applications could be achieved with acceptable computing costs. The proposed scheme supports performance tuning between monitoring cost and the system response time, which enables its adaption to network environments with different specifications.
[1]
Jia Wang,et al.
Analyzing peer-to-peer traffic across large networks
,
2002,
IMW '02.
[2]
James Won-Ki Hong,et al.
Towards Peer-to-Peer Traffic Analysis Using Flows
,
2003,
DSOM.
[3]
Cormac J. Sreenan,et al.
mmdump: a tool for monitoring internet multimedia traffic
,
2000,
CCRV.
[4]
George C. Polyzos,et al.
A Parameterizable Methodology for Internet Traffic Flow Profiling
,
1995,
IEEE J. Sel. Areas Commun..
[5]
Patrick Haffner,et al.
ACAS: automated construction of application signatures
,
2005,
MineNet '05.
[6]
Michalis Faloutsos,et al.
Transport layer identification of P2P traffic
,
2004,
IMC '04.
[7]
Vladimir N. Vapnik,et al.
The Nature of Statistical Learning Theory
,
2000,
Statistics for Engineering and Information Science.
[9]
Oliver Spatscheck,et al.
Accurate, scalable in-network identification of p2p traffic using application signatures
,
2004,
WWW '04.
[10]
W. Marsden.
I and J
,
2012
.
[11]
James E. Smith,et al.
The architecture of virtual machines
,
2005,
Computer.
[12]
Myung-Sup Kim,et al.
Towards Streaming Media Traffic Monitoring and Analysis
,
2003
.
[13]
Phillip Y. Lipscy,et al.
Internet Corporation for Assigned Names and Numbers
,
2020,
The SAGE International Encyclopedia of Mass Media and Society.