PeerRush: mining for unwanted p2p traffic

  • Authors:
  • Babak Rahbarinia;Roberto Perdisci;Andrea Lanzi;Kang Li

  • Affiliations:
  • Dept. of Computer Science, University of Georgia, Athens, GA;Dept. of Computer Science, University of Georgia, Athens, GA;EURECOM Institute, Sophia Antipolis, France;Dept. of Computer Science, University of Georgia, Athens, GA

  • Venue:
  • DIMVA'13 Proceedings of the 10th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we present PeerRush, a novel system for the identification of unwanted P2P traffic. Unlike most previous work, PeerRush goes beyond P2P traffic detection, and can accurately categorize the detected P2P traffic and attribute it to specific P2P applications, including malicious applications such as P2P botnets. PeerRush achieves these results without the need of deep packet inspection, and can accurately identify applications that use encrypted P2P traffic. We implemented a prototype version of PeerRush and performed an extensive evaluation of the system over a variety of P2P traffic datasets. Our results show that we can detect all the considered types of P2P traffic with up to 99.5% true positives and 0.1% false positives. Furthermore, PeerRush can attribute the P2P traffic to a specific P2P application with a misclassification rate of 0.68% or less.