Analyzing peer-to-peer traffic across large networks
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Accurate, scalable in-network identification of p2p traffic using application signatures
Proceedings of the 13th international conference on World Wide Web
The CoralReef Software Suite as a Tool for System and Network Administrators
LISA '01 Proceedings of the 15th USENIX conference on System administration
A parameterizable methodology for Internet traffic flow profiling
IEEE Journal on Selected Areas in Communications
Packet-level traffic measurements from the Sprint IP backbone
IEEE Network: The Magazine of Global Internetworking
Internet traffic classification using bayesian analysis techniques
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
BLINC: multilevel traffic classification in the dark
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Defending against hitlist worms using network address space randomization
Proceedings of the 2005 ACM workshop on Rapid malcode
An Active Splitter Architecture for Intrusion Detection and Prevention
IEEE Transactions on Dependable and Secure Computing
Beyond bloom filters: from approximate membership checks to approximate state machines
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Traffic classification using clustering algorithms
Proceedings of the 2006 SIGCOMM workshop on Mining network data
Rarest first and choke algorithms are enough
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Unexpected means of protocol inference
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Identifying and discriminating between web and peer-to-peer traffic in the network core
Proceedings of the 16th international conference on World Wide Web
Characterizing unstructured overlay topologies in modern P2P file-sharing systems
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Should internet service providers fear peer-assisted content distribution?
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
The power of slicing in internet flow measurement
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Byte me: a case for byte accuracy in traffic classification
Proceedings of the 3rd annual ACM workshop on Mining network data
Defending against hitlist worms using network address space randomization
Computer Networks: The International Journal of Computer and Telecommunications Networking
Offline/realtime traffic classification using semi-supervised learning
Performance Evaluation
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Statistical models for Gnutella signaling traffic
Computer Networks: The International Journal of Computer and Telecommunications Networking
On Gnutella topology dynamics by studying leaf and ultra connection jointly in phase space
Computer Networks: The International Journal of Computer and Telecommunications Networking
The P2P war: Someone is monitoring your activities
Computer Networks: The International Journal of Computer and Telecommunications Networking
Machine learning for efficient neighbor selection in unstructured P2P networks
SYSML'07 Proceedings of the 2nd USENIX workshop on Tackling computer systems problems with machine learning techniques
Learning for accurate classification of real-time traffic
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Passive network forensics: behavioural classification of network hosts based on connection patterns
ACM SIGOPS Operating Systems Review
Characterizing unstructured overlay topologies in modern P2P file-sharing systems
IEEE/ACM Transactions on Networking (TON)
Semi-supervised approach to rapid and reliable labeling of large data sets
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Internet traffic modeling by means of Hidden Markov Models
Computer Networks: The International Journal of Computer and Telecommunications Networking
ICANNGA '07 Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
Federation Based Solution for Peer-to-Peer Network Management
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
Context-aware clustering of DNS query traffic
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
Traffic analysis of mobile broadband networks
WICON '07 Proceedings of the 3rd international conference on Wireless internet
Why file sharing networks are dangerous?
Communications of the ACM - Inspiring Women in Computing
Acceleration of decision tree searching for IP traffic classification
Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
Empirical Analysis of Application-Level Traffic Classification Using Supervised Machine Learning
APNOMS '08 Proceedings of the 11th Asia-Pacific Symposium on Network Operations and Management: Challenges for Next Generation Network Operations and Service Management
Transport Layer Identification of Skype Traffic
Information Networking. Towards Ubiquitous Networking and Services
Topnet: a network-aware top(1)
LISA'08 Proceedings of the 22nd conference on Large installation system administration conference
A P2P system based on JXTA-overlay and its application for end-device control
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
Online hybrid traffic classifier for Peer-to-Peer systems based on network processors
Applied Soft Computing
Bittorrent peer identification based on behaviors of a choke algorithm
Proceedings of the 4th Asian Conference on Internet Engineering
Traffic classification using en-semble learning and co-training
AIC'08 Proceedings of the 8th conference on Applied informatics and communications
Traffic modeling and proportional partial caching for peer-to-peer systems
IEEE/ACM Transactions on Networking (TON)
A nonlinear, recurrence-based approach to traffic classification
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient application identification and the temporal and spatial stability of classification schema
Computer Networks: The International Journal of Computer and Telecommunications Networking
Profiling and identification of P2P traffic
Computer Networks: The International Journal of Computer and Telecommunications Networking
kP2PADM: An In-Kernel Architecture of P2P Management Gateway
IEICE - Transactions on Information and Systems
Proceedings of the 18th international conference on World wide web
PBS: Periodic Behavioral Spectrum of P2P Applications
PAM '09 Proceedings of the 10th International Conference on Passive and Active Network Measurement
Measuring Mobile Peer-to-Peer Usage: Case Finland 2007
PAM '09 Proceedings of the 10th International Conference on Passive and Active Network Measurement
Internet traffic classification demystified: myths, caveats, and the best practices
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Inferring undesirable behavior from P2P traffic analysis
Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems
Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems
GTVS: Boosting the Collection of Application Traffic Ground Truth
TMA '09 Proceedings of the First International Workshop on Traffic Monitoring and Analysis
Identify P2P Traffic by Inspecting Data Transfer Behaviour
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Review: Application classification using packet size distribution and port association
Journal of Network and Computer Applications
Classification of P2P and HTTP Using Specific Protocol Characteristics
EUNICE '09 Proceedings of the 15th Open European Summer School and IFIP TC6.6 Workshop on The Internet of the Future
Challenging statistical classification for operational usage: the ADSL case
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
Study of encrypted and non-encrypted BitTorrent traffic
CSNA '07 Proceedings of the IASTED International Conference on Communication Systems, Networks, and Applications
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Discriminating internet applications based on multiscale analysis
NGI'09 Proceedings of the 5th Euro-NGI conference on Next Generation Internet networks
On traffic characteristics of a broadband wireless internet access
NGI'09 Proceedings of the 5th Euro-NGI conference on Next Generation Internet networks
Monitoring the impact of P2P users on a broadband operator's network
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
One-Against-All Methodology for Features Selection and Classification of Internet Applications
IPOM '09 Proceedings of the 9th IEEE International Workshop on IP Operations and Management
Traffic Classification Based on Flow Similarity
IPOM '09 Proceedings of the 9th IEEE International Workshop on IP Operations and Management
Controlling file distribution in Winny network through index poisoning
ICOIN'09 Proceedings of the 23rd international conference on Information Networking
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
Service-based traffic classification: principles and validation
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Slimming down Deep packet inspection systems
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Distributed P2P traffic identification method
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A network traffic identification method based on finite state machine
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
New detection of peer-to-peer controlled bots on the host
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A novel self-learning architecture for p2p traffic classification in high speed networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proposion and analysis of a TCP feature of P2P traffic
PAKDD'07 Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining
Measurement based modeling of eDonkey peer-to-peer file sharing system
ITC20'07 Proceedings of the 20th international teletraffic conference on Managing traffic performance in converged networks
The P2P war: someone is monitoring your activities!
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Composite lightweight traffic classification system for network management
International Journal of Network Management
Probabilistic identification for hard to classify protocol
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Classification of audio and video traffic over HTTP protocol
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Trends and differences in connection-behavior within classes of internet backbone traffic
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
Identify P2P traffic by inspecting data transfer behavior
Computer Communications
Impact of asymmetric routing on statistical traffic classification
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Time-critical data dissemination in cooperative peer-to-peer systems
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Volume traffic anomaly detection using hierarchical clustering
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
Peer-to-peer application recognition based on signaling activity
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Efficient peerGroup management in JXTA-Overlay P2P system for developing groupware tools
The Journal of Supercomputing
BTWorld: towards observing the global BitTorrent file-sharing network
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
PAM'10 Proceedings of the 11th international conference on Passive and active measurement
Internet traffic classification demystified: on the sources of the discriminative power
Proceedings of the 6th International COnference
An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols
International Journal of Security and Networks
A VoIP Traffic Identification Scheme Based on Host and Flow Behavior Analysis
Journal of Network and Systems Management
Expert Systems with Applications: An International Journal
Analysis of the impact of sampling on NetFlow traffic classification
Computer Networks: The International Journal of Computer and Telecommunications Networking
KISS: stochastic packet inspection classifier for UDP traffic
IEEE/ACM Transactions on Networking (TON)
Host-Based P2P Flow Identification and Use in Real-Time
ACM Transactions on the Web (TWEB)
Optimally designing caches to reduce P2P traffic
Computer Communications
Graption: A graph-based P2P traffic classification framework for the internet backbone
Computer Networks: The International Journal of Computer and Telecommunications Networking
Application of a JXTA-overlay P2P system for end-device control and e-learning
Multimedia Tools and Applications
Optical metropolitan networks: packet format, MAC protocols and quality of service
Network performance engineering
Social network analysis on KAD and its application
APWeb'11 Proceedings of the 13th Asia-Pacific web conference on Web technologies and applications
Inferring users' online activities through traffic analysis
Proceedings of the fourth ACM conference on Wireless network security
A fuzzy pattern-based filtering algorithm for botnet detection
Computer Networks: The International Journal of Computer and Telecommunications Networking
WSEAS TRANSACTIONS on COMMUNICATIONS
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 23rd International Teletraffic Congress
SMILER: Towards Practical Online Traffic Classification
Proceedings of the 2011 ACM/IEEE Seventh Symposium on Architectures for Networking and Communications Systems
Session level flow classification by packet size distribution and session grouping
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the identification and analysis of p2p traffic aggregation
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
A Modular Machine Learning System for Flow-Level Traffic Classification in Large Networks
ACM Transactions on Knowledge Discovery from Data (TKDD)
Time-Out bloom filter: a new sampling method for recording more flows
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Analysis of peer-to-peer traffic on ADSL
PAM'05 Proceedings of the 6th international conference on Passive and Active Network Measurement
Enhancing network intrusion detection with integrated sampling and filtering
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Entropy based discriminators for p2p teletraffic characterization
ICONIP'11 Proceedings of the 18th international conference on Neural Information Processing - Volume Part II
Challenges in network application identification
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Unmasking the growing UDP traffic in a campus network
PAM'12 Proceedings of the 13th international conference on Passive and Active Measurement
Internet traffic classification using multifractal analysis approach
Proceedings of the 15th Communications and Networking Simulation Symposium
Methodology for detection and restraint of p2p applications in the network
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Classifying internet one-way traffic
Proceedings of the 2012 ACM conference on Internet measurement conference
High throughput and programmable online trafficclassifier on FPGA
Proceedings of the ACM/SIGDA international symposium on Field programmable gate arrays
Computer Networks: The International Journal of Computer and Telecommunications Networking
Detection and classification of peer-to-peer traffic: A survey
ACM Computing Surveys (CSUR)
Toward an efficient and scalable feature selection approach for internet traffic classification
Computer Networks: The International Journal of Computer and Telecommunications Networking
Online NetFPGA decision tree statistical traffic classifier
Computer Communications
Scap: stream-oriented network traffic capture and analysis for high-speed networks
Proceedings of the 2013 conference on Internet measurement conference
PeerRush: mining for unwanted p2p traffic
DIMVA'13 Proceedings of the 10th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Reviewing traffic classification
DataTraffic Monitoring and Analysis
Hi-index | 0.00 |
Since the emergence of peer-to-peer (P2P) networking in the late '90s, P2P applications have multiplied, evolved and established themselves as the leading `growth app' of Internet traffic workload. In contrast to first-generation P2P networks which used well-defined port numbers, current P2P applications have the ability to disguise their existence through the use of arbitrary ports. As a result, reliable estimates of P2P traffic require examination of packet payload, a methodological landmine from legal, privacy, technical, logistic, and fiscal perspectives. Indeed, access to user payload is often rendered impossible by one of these factors, inhibiting trustworthy estimation of P2P traffic growth and dynamics. In this paper, we develop a systematic methodology to identify P2P flows at the transport layer, i.e., based on connection patterns of P2P networks, and without relying on packet payload. We believe our approach is the first method for characterizing P2P traffic using only knowledge of network dynamics rather than any user payload. To evaluate our methodology, we also develop a payload technique for P2P traffic identification, by reverse engineering and analyzing the nine most popular P2P protocols, and demonstrate its efficacy with the discovery of P2P protocols in our traces that were previously unknown to us. Finally, our results indicate that P2P traffic continues to grow unabatedly, contrary to reports in the popular media.