FidoNet: technology, tools, and history
Communications of the ACM - Special issue on internetworking
[15] Peer-to-Peer Architecture Case Study: Gnutella Network
P2P '01 Proceedings of the First International Conference on Peer-to-Peer Computing
Transport layer identification of P2P traffic
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
A Methodology for P2P File-Sharing Traffic Detection
HOT-P2P '05 Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems
Identifying and discriminating between web and peer-to-peer traffic in the network core
Proceedings of the 16th international conference on World Wide Web
UsenetDHT: a low-overhead design for Usenet
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
A New Method of P2P Traffic Identification Based on Support Vector Machine at the Host Level
ITCS '09 Proceedings of the 2009 International Conference on Information Technology and Computer Science - Volume 02
A Systematic Study on Peer-to-Peer Botnets
ICCCN '09 Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks
Distributed P2P traffic identification method
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
New detection of peer-to-peer controlled bots on the host
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Non-intrusive Identification of Peer-to-Peer Traffic
CTRQ '10 Proceedings of the 2010 Third International Conference on Communication Theory, Reliability, and Quality of Service
Graption: A graph-based P2P traffic classification framework for the internet backbone
Computer Networks: The International Journal of Computer and Telecommunications Networking
Challenges in experimenting with botnet detection systems
CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test
Detecting stealthy P2P botnets using statistical traffic fingerprints
DSN '11 Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems&Networks
Toward the accurate identification of network applications
PAM'05 Proceedings of the 6th international conference on Passive and Active Network Measurement
Hi-index | 0.00 |
P2P networks are consuming more and more Internet resources, it is estimated that approximately 70% of all Internet carried traffic is composed by packets from these networks. Moreover, they still represent the main infection vector for various types of malware and can be used as command and control channel for P2P botnets, besides being famous for being notoriously used to distribute a range of pirated files (movies, music, games,...). In this paper we present some typical characteristics of P2P networks and propose a new architecture based on filters to detect hosts running P2P applications. We also provide a methodology on how to prevent the communication of those hosts in order to avoid undesirable impacts in the operation of the network as a whole.