Abstract
With the improvement of computer networks and the growth of bandwidth, the types of Internet traffic have changed. The P2P file sharing application became the significant source of network traffic. This paper examines the features for P2P file sharing application according to the packets of OSI layer 3 and layer 4. Four features are defined in this paper, including quantity of packet count, percentage of TCP packet count, percentage of specific size of packet count, and percentage of duplicate destination port numbers. Based on these features, the hosts running P2P file sharing application can be identified. The specific signatures in the payload of OSI layer 7 are used to verify which P2P file sharing application the host is running.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
S. Sen, and Jia Wang, “Analyzing Peer-To-Peer Traffic Across Large Networks,” Trans. IEEE/ACM Networking, Vol. 12, No. 2, pp. 219-232, April, 2004
Hamada, T., Chujo, K., Chujo, T., and Yang, X., “Peer-to-Peer Traffic in Metro Networks: Analysis, Modeling, and Policies,” Proc. Network Operations and Management Symposium, Vol. 1,pp. 425-438, April, 2004
S. Saroiu, P. Krishna Gummadi, and Steven D. Gribble, “A Measurement Study of Peer-to-Peer File Sharing Systems,” Proc. Multimedia Computing and Networking, January, 2002
Spognardi, Alessandro Lucarelli, and Roberto Di Pietro, “A Methodology for P2P File-Sharing Traffic Detection,” Proc. the Second International Workshop on Hot Topics in Peer-to-Peer Systems, pp. 52-61, July, 2005
Matsuda T., Nakamura F., Wakahara, and Y. Tanaka, “Traffic Features Fit for P2P Discrimination,” Proc. 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, pp. 230- 235, 2005
T. Karagiannis, A. Broido, M. Faloutsos, and Kc claffy, “Transport Layer Identification of P2P Traffic,” Proc. 4th ACM SIGCOMM Conference on Internet Measurement, pp. 121-134, New York, NY, USA, 2004
Li Juan Zhou, Zhi Tong Li, and Bin Liu, “ P2P Traffic Identification by TCP Flow Analysis,” Proc. International Workshop on Networking, Architecture, and Storages, pp. 47-50, 2006
Wang Jin Song, Zhang Yan, Wu Qing, and Wu Gong Yi, “Connection Pattern-Based P2P Application Identification Characteristic,” Proc. Network and Parallel Computing Workshops, pp. 437-441, September, 2007
S Sen, O Spatscheck, and D. Wang, “Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures,” Proc.13th International conference on World Wide Web, 2004
The eMule protocol, http://www.emule-project.net/
The Foxy protocol, http://tw.gofoxy.net/
The BitTorrent protocol, http://www.bittorrent.com/
Mong-Fong Horng, Chun-Wei Chen, Chin-Shun Chuang, and Cheng-Yu Lin, “Identification and Analysis of P2P Traffic – An Example of BitTorrent,” Proc. First International Conference on Innovative Computing, Information and Control, pp. 266-269, 2006
The Ethereal, http://www.ethereal.com/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this paper
Cite this paper
Chen, JB. (2010). Features Based Approach to Identify the P2P File Sharing. In: Sobh, T. (eds) Innovations and Advances in Computer Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3658-2_26
Download citation
DOI: https://doi.org/10.1007/978-90-481-3658-2_26
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3657-5
Online ISBN: 978-90-481-3658-2
eBook Packages: EngineeringEngineering (R0)