2015 International Conference on Emerging Information Technology and Engineering Solutions 2015
DOI: 10.1109/eites.2015.16
|View full text |Cite
|
Sign up to set email alerts
|

Heuristic-Based Real-Time P2P Traffic Identification

Abstract: Peer-to-Peer (P2P) networks have seen a rapid growth, spanning diverse applications like online anonymity (Tor), online payment (Bitcoin), file sharing (BitTorrent), etc. However, the success of these applications has raised concerns among ISPs and Network administrators. These types of traffic worsen the congestion of the network, and create security vulnerabilities. Hence, P2P traffic identification has been researched actively in recent times. Early P2P traffic identification approaches were based on port-b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Our past work [14] proposed heuristic-based P2P traffic identification based on connection patterns. We proposed several heuristics derived from connection patterns to detect the P2P hosts in real-time.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Our past work [14] proposed heuristic-based P2P traffic identification based on connection patterns. We proposed several heuristics derived from connection patterns to detect the P2P hosts in real-time.…”
Section: Related Workmentioning
confidence: 99%
“…To build these ML models we require large amount of time with respective to training dataset size. Apart from these approaches, research community focused on heuristicbased methods to identify P2P traffic in real-time [13], [14], [15], [16].…”
Section: Introductionmentioning
confidence: 99%
“…These characteristics were examined by collecting 100 blocks of P2P traffic (consisting of BitSpirit, Emule and other P2P applications), each ranging from 100 M bytes to 200 M bytes and evaluation of this approach achieved an accuracy ranging from 98.4 to 99.6 %. Reddy and Hota [71] proposed a new set of heuristics to identify P2P host based on its connection patterns and they do not require any payload signatures. The datasets used was realistic in nature ad consisted of applications namely Http, FTP, Dropbox, SMTP, eMule, Frostwire, Skype, uTorrent and Vuze.…”
Section: Classification Of Traffic In the Darkmentioning
confidence: 99%
“…Historically, traffic classification typically used port-based identification, which was simple to implement and yielded high accuracy for certain applications such as SMTP or DNS given their static use of specific port numbers. However, most of the present Internet applications either use dynamic port numbers randomly without any prior assumption or use encryption and tunnelling traffic through wellknown port such as 80 443 [9]. For example, Skype and P2P applications use TCP port 80 [10] which would appear to be web browsing when using portbased classification, despite the fact that it could be messaging, file transfer or voice communication traffic.…”
Section: Port-based Approachmentioning
confidence: 99%