IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference 2008
DOI: 10.1109/glocom.2008.ecp.475
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time P2P Traffic Identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0
1

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(22 citation statements)
references
References 9 publications
0
21
0
1
Order By: Relevance
“…Most prior work has either focused on P2P traffic classification from the perspective of a more general problem of Internet traffic classification [18], [19], [20], or has given special attention to detection of botnets (centralized or distributed) in Internet traffic [21], [22], [23]. The detection of P2P botnet traffic in the presence of benign P2P traffic has not received much attention.…”
Section: Related Workmentioning
confidence: 99%
“…Most prior work has either focused on P2P traffic classification from the perspective of a more general problem of Internet traffic classification [18], [19], [20], or has given special attention to detection of botnets (centralized or distributed) in Internet traffic [21], [22], [23]. The detection of P2P botnet traffic in the presence of benign P2P traffic has not received much attention.…”
Section: Related Workmentioning
confidence: 99%
“…Apart from its universality, this method is very efficient to classify some protocols operating on fixed port numbers. Using it, however, gives very bad results in detection of protocols using dynamic port numbers, like P2P and Skype [1]- [3]. The second drawback is not less severe: many scam applications use well-known port numbers to be treated in the network with priority.…”
Section: Introductionmentioning
confidence: 99%
“…Deep Packet Inspection (DPI) solutions are quite slow and require a lot of processing power [1], [3]. Furthermore they relay on inspecting the user data and therefore privacy and confidentiality issues can appear [1]. Application signatures for every application must be created outside the system and kept up to date [1], what can be problematic.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…BLINC [6] proposed multilevel traffic identification at different levels -social, functional and application level from the 4-tuple flows. The research community has adopted Machine Leaning (ML) techniques [7], [8], [9] [10], [11], [12] to classify P2P traffic with higher accuracy. This approach is based on statistical characteristics obtained from the 5-tuple flows.…”
Section: Introductionmentioning
confidence: 99%