Identification of P2P traffic based on the content redistribution characteristic

Identification of P2P traffic is very useful for many network management tasks such as application-specific traffic engineering, network planning and monitoring. However, this is a challenging issue because many P2P applications use dynamic port numbers, and deriving signatures that can be used for reliable detection manually is time consuming and difficult. In this paper, we propose a novel approach to detect P2P traffic without any application-specific signatures. It is based on the content redistribution characteristic of P2P protocol: every peer acts both as a server and a client, so it will redistribute the content received to other peers. To evaluate our approach, we use traces collected in our campus network and a signature-based classifier is also implemented. Experiment results show that the approach can be used to identify known and unknown P2P traffic with very low false positive rate, and achieves high accuracy when detecting P2P streaming traffic.

[1]  Hiroshi Esaki,et al.  The impact and implications of the growth in residential user-to-user traffic , 2006, SIGCOMM.

[2]  Panayiotis Mavrommatis,et al.  Identifying Known and Unknown Peer-to-Peer Traffic , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[3]  Michalis Faloutsos,et al.  Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[4]  Erwin P. Rathgeb,et al.  Evaluation of an Efficient Measurement Concept for P2P Multiprotocol Traffic Analysis , 2006, 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO'06).

[5]  Patrick Haffner,et al.  ACAS: automated construction of application signatures , 2005, MineNet '05.

[6]  Oliver Spatscheck,et al.  Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.

[7]  Michalis Faloutsos,et al.  Transport layer identification of P2P traffic , 2004, IMC '04.

[8]  George Varghese,et al.  Automated Worm Fingerprinting , 2004, OSDI.

[9]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[10]  Krishna P. Gummadi,et al.  An analysis of Internet content delivery systems , 2002, OPSR.

[11]  Jia Wang,et al.  Analyzing peer-to-peer traffic across large networks , 2002, IMW '02.

[12]  Carey L. Williamson,et al.  A Longitudinal Study of P2P Traffic Classification , 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation.

[13]  Yang Liu,et al.  Solving the App-Level Classification Problem of P2P Traffic Via Optimized Support Vector Machines , 2006, Sixth International Conference on Intelligent Systems Design and Applications.

[14]  Roberto Di Pietro,et al.  A methodology for P2P file-sharing traffic detection , 2005, Second International Workshop on Hot Topics in Peer-to-Peer Systems.