2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing 2011
DOI: 10.1109/pdp.2011.9
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Network-Level Impacts of P2P Flows

Abstract: Abstract-It has been clear for a long time that P2P applications represent a large proportion of the load on the network infrastructure. This is why significant research efforts have been devoted to reducing this load, in the form of ISP friendly P2P solutions. These solutions focus on the volume of the traffic as opposed to the number of network flows. At the same time, we are witnessing a great demand for more and more intelligence in the network such as flow based monitoring and application recognition, whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…However, this scheme is made for small-scale network infrastructures (LANs), and thus cannot be deployed or validated on large-scale networks. Similarly, it uses network address translation (NAT) mechanism to route network traffic; however, NAT is not efficient in detecting P2P network flows (Jelasity et al, 2011); moreover, it cannot scan traffic contents. Table 5 summarizes traffic mining based botnet detection approaches and presents their implications and critical aspects.…”
Section: Specifically Used For Manetmentioning
confidence: 99%
“…However, this scheme is made for small-scale network infrastructures (LANs), and thus cannot be deployed or validated on large-scale networks. Similarly, it uses network address translation (NAT) mechanism to route network traffic; however, NAT is not efficient in detecting P2P network flows (Jelasity et al, 2011); moreover, it cannot scan traffic contents. Table 5 summarizes traffic mining based botnet detection approaches and presents their implications and critical aspects.…”
Section: Specifically Used For Manetmentioning
confidence: 99%