Skip to main content

Features Based Approach to Identify the P2P File Sharing

  • Conference paper
  • First Online:
  • 942 Accesses

Abstract

With the improvement of computer networks and the growth of bandwidth, the types of Internet traffic have changed. The P2P file sharing application became the significant source of network traffic. This paper examines the features for P2P file sharing application according to the packets of OSI layer 3 and layer 4. Four features are defined in this paper, including quantity of packet count, percentage of TCP packet count, percentage of specific size of packet count, and percentage of duplicate destination port numbers. Based on these features, the hosts running P2P file sharing application can be identified. The specific signatures in the payload of OSI layer 7 are used to verify which P2P file sharing application the host is running.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Sen, and Jia Wang, “Analyzing Peer-To-Peer Traffic Across Large Networks,” Trans. IEEE/ACM Networking, Vol. 12, No. 2, pp. 219-232, April, 2004

    Article  Google Scholar 

  2. Hamada, T., Chujo, K., Chujo, T., and Yang, X., “Peer-to-Peer Traffic in Metro Networks: Analysis, Modeling, and Policies,” Proc. Network Operations and Management Symposium, Vol. 1,pp. 425-438, April, 2004

    Google Scholar 

  3. S. Saroiu, P. Krishna Gummadi, and Steven D. Gribble, “A Measurement Study of Peer-to-Peer File Sharing Systems,” Proc. Multimedia Computing and Networking, January, 2002

    Google Scholar 

  4. Spognardi, Alessandro Lucarelli, and Roberto Di Pietro, “A Methodology for P2P File-Sharing Traffic Detection,” Proc. the Second International Workshop on Hot Topics in Peer-to-Peer Systems, pp. 52-61, July, 2005

    Google Scholar 

  5. Matsuda T., Nakamura F., Wakahara, and Y. Tanaka, “Traffic Features Fit for P2P Discrimination,” Proc. 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, pp. 230- 235, 2005

    Google Scholar 

  6. T. Karagiannis, A. Broido, M. Faloutsos, and Kc claffy, “Transport Layer Identification of P2P Traffic,” Proc. 4th ACM SIGCOMM Conference on Internet Measurement, pp. 121-134, New York, NY, USA, 2004

    Google Scholar 

  7. Li Juan Zhou, Zhi Tong Li, and Bin Liu, “ P2P Traffic Identification by TCP Flow Analysis,” Proc. International Workshop on Networking, Architecture, and Storages, pp. 47-50, 2006

    Google Scholar 

  8. Wang Jin Song, Zhang Yan, Wu Qing, and Wu Gong Yi, “Connection Pattern-Based P2P Application Identification Characteristic,” Proc. Network and Parallel Computing Workshops, pp. 437-441, September, 2007

    Google Scholar 

  9. S Sen, O Spatscheck, and D. Wang, “Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures,” Proc.13th International conference on World Wide Web, 2004

    Google Scholar 

  10. The eMule protocol, http://www.emule-project.net/

  11. The Foxy protocol, http://tw.gofoxy.net/

  12. The BitTorrent protocol, http://www.bittorrent.com/

  13. Mong-Fong Horng, Chun-Wei Chen, Chin-Shun Chuang, and Cheng-Yu Lin, “Identification and Analysis of P2P Traffic – An Example of BitTorrent,” Proc. First International Conference on Innovative Computing, Information and Control, pp. 266-269, 2006

    Google Scholar 

  14. The Ethereal, http://www.ethereal.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this paper

Cite this paper

Chen, JB. (2010). Features Based Approach to Identify the P2P File Sharing. In: Sobh, T. (eds) Innovations and Advances in Computer Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3658-2_26

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-3658-2_26

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-3657-5

  • Online ISBN: 978-90-481-3658-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics