Abstract
The services provided through peer-to-peer (P2P) architecture involve the transmission of text, images, documents, and multimedia. Especially the distribution of multimedia content like video and audio is mainly demanded by clients and has become the major reason for generating traffic by consuming significant bandwidth. This traffic is mostly generated by P2P applications like Napster, Gnutella, BitTorrent, PPTV, YuppTV, and many more. To use the network bandwidth proficiently, thus classification and identification of this Internet traffic became necessary. Moreover, it is required to classify the specific P2P application traffic, so data distribution over the P2P network can be improved. This survey paper discusses the working of different P2P applications for which traffic is created and raises related issues. The paper deliberates the various techniques and overlays that are used to provide the services over the P2P network. This paper includes the various techniques of feature selection and the machine learning algorithm for the identification and classification of internet traffic. This paper also reviewed the recent developments and highlights the future direction of research work in P2P networks.
Similar content being viewed by others
Data availibility
The author(s) will supply the datasets and materials utilized and/or analyzed in this work.
References
Forouzan BA (2007) Data communications and networking (SIE). Tata McGraw-Hill Education, New York
Thampi SM (2013) A review on P2P video streaming. arXiv preprint arXiv:1304.1235
Tran DA, Hua KA, Do T (2003) Zigzag: an efficient peer-to-peer scheme for media streaming. In IEEE INFOCOM 2003. In: Twenty-second annual joint conference of the IEEE computer and communications societies (IEEE Cat. No. 03CH37428), vol 2, pp 1283–1292. IEEE
Bhatia M, Rai MK (2017) Identifying P2P traffic: a survey. Peer-to-Peer Netw Appl 10(5):1182–1203
Karagiannis T, Broido A, Brownlee N, Claffy K, Faloutsos M (2003) File-sharing in the Internet: a characterization of P2P traffic in the backbone. Tech. Rep., University of California, Riverside, USA
Pal K, Govil MC, Ahmed M (2018) Priority-based scheduling scheme for live video streaming in peer-to-peer network. Multimedia Tools Appl 77(18):24427–24457
Pal K, Govil MC, Ahmed M (2017) Comparative analysis of utilization based hybrid overlay for live video streaming in P2P network. Int J Intell Eng Syst 10(3):343–350
Yang K, Wang B, Zhang Z (2013) A method of identifying P2P live streaming based on union features. In: 2013 IEEE 4th international conference on software engineering and service science. IEEE, pp 426–429
Gomes JV, Inácio PRM, Pereira M, Freire MM, Monteiro PP (2013) Detection and classification of peer-to-peer traffic: a survey. ACM Comput Surv (CSUR) 45(3):1–40
Moore AW, Papagiannaki K (2005) Toward the accurate identification of network applications. In: International workshop on passive and active network measurement. Springer, Berlin, pp 41–54
Chen Y, Zhang B, Chen C, Chiu DM (2013) Performance modeling and evaluation of peer-to-peer live streaming systems under flash crowds. IEEE/ACM Trans Netw 22(4):1106–1120
Wallach DS (2003) A survey of peer-to-peer security issues. In: 2002 Mext-NSF-JSPS international conference on software security: theories and systems (ISSS)
Androutsellis-Theotokis S, Spinellis D (2004) A survey of peer-to-peer content distribution technologies. ACM Comput Surv (CSUR) 36(4):335–371
Lua EK, Crowcroft J, Pias M, Sharma R, Lim S (2005) A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun Surv Tutor 7(2):72–93
Chothia T, Chatzikokolakis K (2005) A survey of anonymous peer-to-peer file-sharing. In: International conference on embedded and ubiquitous computing. Springer, Berlin, pp. 744–755
Li B, Yin H (2007) Peer-to-peer live video streaming on the internet: issues, existing approaches, and challenges [Peer-to-Peer Multimedia Streaming]. IEEE Commun Mag 45(6):94–99
Xiao R-Y (2008) Survey on anonymity in unstructured peer-to-peer systems. J Comput Sci Technol 23(4):660–671
Liu Y, Guo Y, Liang C (2008) A survey on peer-to-peer video streaming systems. Peer-to-Peer Netw Appl 1(1):18–28
Park H, Yang J, Park J, Kang SG, Choi JK (2008) A survey on peer-to-peer overlay network schemes. In: 2008 10th international conference on advanced communication technology, vol 2. IEEE, pp 986–988
Peltotalo J, Harju J, Jantunen A, Saukko M, Vatamoinen L, Curcio I, Bouazizi I, Hannuksela M (2008) Peer-to-peer streaming technology survey. In: Seventh international conference on networking (ICN 2008). IEEE, pp 342–350
Gupta A, Awasthi LK (2012) Peer-to-peer networks and computation: current trends and future perspectives. Comput Inform 30(3):559–594
Hareesh K, Manjaiah DH (2011) Peer-to-peer live streaming and video on demand design issues and its challenges. Int J Peer Peer Netw 2(4):1
Shen Z, Luo J, Zimmermann R, Vasilakos AV (2011) Peer-to-peer media streaming: insights and new developments. Proc IEEE 99(12):2089–2109
Zhang X, Hassanein H (2012) A survey of peer-to-peer live video streaming schemes-an algorithmic perspective. Comput Netw 56(15):3548–3579
Shang-Fu G, Jian-Lei Z (2012) A survey of reputation and trust mechanism in peer-to-peer network. In: 2012 international conference on industrial control and electronics engineering. IEEE, pp 116–119
Navimipour NJ, Rahmani AM, Navin AH, Hosseinzadeh M (2014) Resource discovery mechanisms in grid systems: a survey. J Netw Comput Appl 41:389–410
Samuvelraj G, Nalini N (2014) A survey of self organizing trust method to avoid malicious peers from peer to peer network. In: 2014 international conference on green computing communication and electrical engineering (ICGCCEE). IEEE, pp 1–4
Felber P, Kropf P, Schiller E, Serbu S (2013) Survey on load balancing in peer-to-peer distributed hash tables. IEEE Commun Surv Tutor 16(1):473–492
Xin-Xin Z, Zhen-Wan Z, Peng K, Ren-Jie S (2015) A survey of resource discovery in mobile peer-to-peer networks. In: 2015 fifth international conference on communication systems and network technologies. IEEE, pp 122–125
BitTorrent. https://www.bittorrent.com/ (2019). Accessed on 10 Oct 2019
Pouwelse JA, Garbacki P, Wang J, Bakker A, Yang J, Iosup A, Epema DHJ, Reinders M, Van Steen MR, Sips HJ (2008) TRIBLER: a social-based peer-to-peer system. Concurr Comput Pract Exp 20(2):127–138
Ripeanu M (2001) Peer-to-peer architecture case study: Gnutella network. In: Proceedings first international conference on peer-to-peer computing. IEEE, pp 99–100
Kulbak Y, Bickson D (2005) The eMule protocol specification. eMule project. http://sourceforge.net
VUZE. https://www.vuze.com/ (2020). Online; Accessed 05 April 2020
eDonkey2000. http://www.edonkey2000.com/ (2019). Online; Accessed on 10 Oct 2019
Napster. http://www.napster.com/ (2019). Online; Accessed on 10 Oct 2019
Sherwood R, Lee S, Bhattacharjee B (2006) Cooperative peer groups in NICE. Comput Netw 50(4):523–544
Tran DA, Hua KA, Do T (2003) Zigzag: an efficient peer-to-peer scheme for media streaming. In: IEEE INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications societies (IEEE cat. No. 03CH37428), vol 2. IEEE, pp 1283–1292
Castro M, Druschel P, Kermarrec A-M, Nandi A, Rowstron A, Singh A (2003) Splitstream: High-bandwidth multicast in cooperative environments. ACM SIGOPS Oper Syst Rev 37(5):298–313
Liao X, Jin H, Liu Y, Ni LM, Deng D (2006) Anysee: Peer-to-peer live streaming. In: Proceedings IEEE INFOCOM 2006. In: 25TH IEEE international conference on computer communications. IEEE, pp 1–10
Magharei N, Rejaie R (2009) Prime: Peer-to-peer receiver-driven mesh-based streaming. IEEE/ACM Trans Netw 17(4):1052–1065
Byun H, Lee M (2009) Hypo: a peer-to-peer based hybrid overlay structure. In: 2009 11th international conference on advanced communication technology, vol 1. IEEE, pp 840–844
PPTV. http://www.pplive.com (2020). Online; Accessed 05 April 2020
iQIYI. https://www.iq.com/ (2020). Online; Accessed 05 April 2020
Hotstar. https://www.hotstar.com/in (2020). Online; Accessed 05 April 2020
Funshion. http://www.fun.tv/ (2020). Online; Accessed 05 April 2020
Gill P, Arlitt M, Li Z, Mahanti A (2007) Youtube traffic characterization: a view from the edge. In: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pp 15–28
Youtube. https://www.youtube.com (2020). Online; Accessed 03 April 2020
YuppTV. https://www.yupptv.com/ (2020). Online; Accessed 05 April 2020
Biryukov A, Khovratovich D, Pustogarov I (2014) Deanonymisation of clients in Bitcoin P2P network. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 15–29
King S, Nadal S (2012) Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August 19, no. 1
Jami. https://jami.net/ (2020). Online; Accessed 05 April 2020
Heckmann O, Bock A (2002) The edonkey 2000 protocol. Rapport technique, Multimedia Communications Lab, Darmstadt University of Technology 13
Liang J, Kumar R, Ross KW (2006) The FastTrack overlay: a measurement study. Comput Netw 50(6):842–858
Liang J, Kumar R, Ross KW (2005) The Kazaa overlay: a measurement study. Comput Netw J 49(6)
DC++. https://dcplusplus.sourceforge.io/ (2019). Online; Accessed on 10 Oct 2019
Application Usage and Threat Report. Palo Alto Networks. https://blog.paloaltonetworks.com/app-usage-risk-report-visualization/. Retrieved on 30 April 2020
OpenNap. http://opennap.sourceforge.net/ (2019). Online; Accessed on 10 Oct 2019
Cascarano N, Ciminiera L, Risso F (2010) Improving cost and accuracy of DPI traffic classifiers. In: Proceedings of the 2010 ACM symposium on applied computing, pp 641–646
Zhang Q, Ma Y, Zhang P, Wang J, Li X (2014) Netflow Based P2P detection in UDP traffic. In: Fifth international conference on intelligent control and information processing. IEEE, pp 250–254
He J, Yang Y, Qiao Y, Deng W (2015) Fine-grained P2P traffic classification by simply counting flows. Front Inf Technol Electron Eng 16(5):391–403
Qin T, Wang L, Zhao D, Zhu M (2016) CUFTI: methods for core users finding and traffic identification in P2P systems. Peer-to-Peer Netw Appl 9(2):424–435
Mohammadi M, Raahemi B, Akbari A, Moeinzadeh H, Nasersharif B (2011) Genetic-based minimum classification error mapping for accurate identifying Peer-to-Peer applications in the internet traffic. Expert Syst Appl 38(6):6417–6423
Jiang D, Tao L (2013) P2P traffic identification research based on the SVM. In: 2013 22nd wireless and optical communication conference. IEEE, pp 683–686
Du Y, Zhang R (2013) Design of a method for encrypted P2P traffic identification using K-means algorithm. Telecommun Syst 53(1):163–168
Liu S-M, Sun Z-X (2015) Active learning for P2P traffic identification. Peer-to-Peer Netw Appl 8(5):733–740
Gong J, Wang W, Wang P, Sun Z (2014) P2P traffic identification method based on an improvement incremental SVM learning algorithm. In: 2014 international symposium on wireless personal multimedia communications (WPMC). IEEE, pp 174–179
Deng S, Luo J, Liu Y, Wang X, Yang J (2014) Ensemble learning model for P2P traffic identification. In: 2014 11th international conference on fuzzy systems and knowledge discovery (FSKD). IEEE, pp 436–440
Korczynski M, Duda A (2014) Markov chain fingerprinting to classify encrypted traffic. In: IEEE INFOCOM 2014-IEEE conference on computer communications. IEEE, pp 781–789
Kumano Y, Ata S, Nakamura N, Nakahira Y, Oka I (2014) Towards real-time processing for application identification of encrypted traffic. In: 2014 international conference on computing, networking and communications (ICNC). IEEE, pp 136–140
Wang D, Zhang L, Yuan Z, Xue Y, Dong Y (2014) Characterizing application behaviors for classifying p2p traffic. In: 2014 international conference on computing, networking and communications (ICNC). IEEE, pp 21–25
Alshammari R, Zincir-Heywood AN (2015) Identification of VoIP encrypted traffic using a machine learning approach. J King Saud Univ Comput Inf Sci 27(1):77–92
Bozdogan C, Gokcen Y, Zincir I (2015) A preliminary investigation on the identification of peer to peer network applications. In: Proceedings of the companion publication of the 2015 annual conference on genetic and evolutionary computation, pp 883–888
Khan RU, Kumar R, Alazab M, Zhang X (2019) A hybrid technique to detect botnets, based on P2P traffic similarity. In: 2019 cybersecurity and cyberforensics conference (CCC). IEEE, pp 136–142
Jamil HA (2019) Feature selection and machine learning classification for live P2P traffic
Zhu Y, Zheng Y (2019) Traffic identification and traffic analysis based on support vector machine. Neural Comput Appl 1–9
Lotfollahi M, Siavoshani MJ, Zade RSH, Saberian M (2020) Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput 24(3):1999–2012
Cao J, Wang D, Zhaoyang Q, Sun H, Li B, Chen C-L (2020) An improved network traffic classification model based on a support vector machine. Symmetry 12(2):301
Bashir A, Huang C, Nandy B, Seddigh N (2013) Classifying P2P activity in Netflow records: a case study on BitTorrent. In: 2013 IEEE international conference on communications (ICC). IEEE, pp 3018–3023
Reddy JM, Hota C (2015) Heuristic-based real-time p2p traffic identification. In: 2015 international conference on emerging information technology and engineering solutions. IEEE, pp 38–43
Bassi JS, Ru LH, Ismail I, Khammas BM, Marsono MN (2016) Online peer-to-peer traffic identification based on complex events processing of traffic event signatures. Jurnal Teknologi 78:7
Yang Z, Li L, Ji Q, Zhu Y (2012) Cocktail method for BitTorrent traffic identification in real time. JCP 7(1):85–95
Sun M-F, Chen J-T (2011) Research of the traffic characteristics for the real time online traffic classification. J China Univ Posts Telecommun 18(3):92–98
Jie H, Yuexiang Y, Yong Q, Chuan T (2013) Accurate classification of P2P traffic by clustering flows. China Commun 10(11):42–51
Datta J, Kataria N, Hubballi N (2015) Network traffic classification in encrypted environment: a case study of google hangout. In: 2015 twenty first national conference on communications (NCC). IEEE, pp 1–6
Yan J, Wu Z, Luo H, Zhang S (2013) P2P traffic identification based on host and flow behaviour characteristics. Cybern Inf Technol 13(3):64–76
Ye W, Cho K (2014) Hybrid P2P traffic classification with heuristic rules and machine learning. Soft Comput 18(9):1815–1827
Ye W, Cho K (2017) P2P and P2P botnet traffic classification in two stages. Soft Comput 21(5):1315–1326
Sen S, Spatscheck O, Wang D (2004) Accurate, scalable in-network identification of p2p traffic using application signatures. In: Proceedings of the 13th international conference on World Wide Web, pp 512–521
Madhukar A, Williamson C (2006) A longitudinal study of P2P traffic classification. In: 14th IEEE international symposium on modeling, analysis, and simulation. IEEE, pp 179–188
Perenyi M, Dang TD, Gefferth A, Molnár S (2006) Identification and analysis of peer-to-peer traffic. J Commun 1(7):36–46
Crotti M, Dusi M, Gringoli F, Salgarelli L (2007) Traffic classification through simple statistical fingerprinting. ACM SIGCOMM Comput Commun Rev 37(1):5–16
Crotti M, Gringoli F, Pelosato P, Salgarelli L (2006) A statistical approach to IP-level classification of network traffic. In: 2006 IEEE international conference on communications, vol 1. IEEE, pp 170–176
Gomes JVP, Inácio PRM, Freire MM, Pereira M, Monteiro PP (2008) Analysis of peer-to-peer traffic using a behavioural method based on entropy. In: 2008 IEEE international performance, computing and communications conference. IEEE, pp 201–208
Hurley J, Garcia-Palacios E, Sezer S (2009) Classification of P2P and HTTP using specific protocol characteristics. In: Meeting of the European network of universities and companies in information and communication engineering. Springer, Berlin, pp 31–40
Branch PA, Heyde A, Armitage GJ (2009) Rapid identification of Skype traffic flows. In: Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video, pp 91–96
Liu H, Lei Yu (2005) Toward integrating feature selection algorithms for classification and clustering. IEEE Trans Knowl Data Eng 17(4):491–502
Fahad A, Tari Z, Khalil I, Habib I, Alnuweiri H (2013) Toward an efficient and scalable feature selection approach for internet traffic classification. Comput Netw 57(9):2040–2057
Dhote Y, Shikha A, Anjana JD (2015) A survey on feature selection techniques for internet traffic classification. In: 2015 international conference on computational intelligence and communication networks (CICN). IEEE, pp 1375–1380
Dash M, Liu H (1997) Feature selection for classification. Intell Data Anal 1(3):131–156
Kohavi R, John GH (1997) Wrappers for feature subset selection. Artif Intell 97(1–2):273–324
Su C-T, Hsu J-H (2005) An extended chi2 algorithm for discretization of real value attributes. IEEE Trans Knowl Data Eng 17(3):437–441
Abdalla BMA, Jamil HA, Hamdan M, Bassi JS, Ismail I, Marsono MN (2017) Multi-stage feature selection for on-line flow peer-to-peer traffic identification. In: Asian simulation conference. Springer, Singapore, pp 509–523
Liu H, Setiono R (1995) Chi2: Feature selection and discretization of numeric attributes. In: Proceedings of 7th IEEE international conference on tools with artificial intelligence. IEEE, pp 388–391
Jolliffe IT (1986) Principal components in regression analysis. In: Principal component analysis. Springer, New York, pp 129–155
Principal Component Analysis. https://www.edureka.co/blog/principal-component-analysis/ (2020). Online; Accessed on 08 March 2020
Frohlich H, Chapelle O, Scholkopf B (2003) Feature selection for support vector machines by means of genetic algorithm. In: Proceedings. 15th IEEE international conference on tools with artificial intelligence. IEEE, pp 142–148
Deshpande A, Kumar M (2018) Artificial intelligence for big data: complete guide to automating big data solutions using artificial intelligence techniques. Packt Publishing Ltd
Juang C-F (2004) A hybrid of genetic algorithm and particle swarm optimization for recurrent network design. IEEE Trans Syst Man Cybernet Part B (Cybernet) 34(2):997–1006
Oreski S, Oreski G (2014) Genetic algorithm-based heuristic for feature selection in credit risk assessment. Expert Syst Appl 41(4):2052–2064
Sanz H, Valim C, Vegas E, Oller JM, Reverter F (2018) SVM-RFE: selection and visualization of the most relevant features through non-linear kernels. BMC Bioinform 19(1):1–18
Animesh A, Ament Z, West JA, Stanley E, Griffin JL (2016) Distributed online flash-crowd detection in P2P swarming systems. BMC Bioinform 17(15):37–49
Unler A, Murat A (2010) A discrete particle swarm optimization method for feature selection in binary classification problems. Eur J Oper Res 206(3):528–539
Liu Y, Wang G, Chen H, Dong H, Zhu X, Wang S (2011) An improved particle swarm optimization for feature selection. J Bionic Eng 8(2):191–200
Mohemmed AW, Zhang M, Johnston M (2009) Particle swarm optimization based adaboost for face detection. In: 2009 IEEE congress on evolutionary computation. IEEE, pp 2494–2501
Xue B, Zhang M, Browne WN (2012) Particle swarm optimization for feature selection in classification: a multi-objective approach. IEEE Trans Cybernet 43(6):1656–1671
Zhang G (2011) Quantum-inspired evolutionary algorithms: a survey and empirical study. J Heurist 17(3):303–351
Biswas T, Kuila P, Ray AK, Sarkar M (2019) Gravitational search algorithm based novel workflow scheduling for heterogeneous computing systems. Simul Model Pract Theory 96:101932
Taradeh M, Mafarja M, Heidari AA, Faris H, Aljarah I, Mirjalili S, Fujita H (2019) An evolutionary gravitational search-based feature selection. Inf Sci 497:219–239
Zimmermann H-J (2012) Fuzzy sets, decision making, and expert systems, vol 10. Springer, Berlin
Zadeh Lotfi A (1965) Fuzzy sets. Inf Control 8(3):338–353
Raja S, Ramaiah S (2017) An efficient fuzzy-based hybrid system to cloud intrusion detection. Int J Fuzzy Syst 19(1):62–77
Liu D, Lung C-H (2011) P2P traffic identification and optimization using fuzzy c-means clustering. In: 2011 IEEE international conference on fuzzy systems (FUZZ-IEEE 2011). IEEE, pp 2245–2252
Ansari MdSA, Pal K, Govil P, Govil MC (2023) A fuzzy based hierarchical flash crowd controller for live video streaming in P2P network. Peer-to-Peer Netw Appl 1–22
Chakraborty B (2008) Feature subset selection by particle swarm optimization with fuzzy fitness function. In: 2008 3rd international conference on intelligent system and knowledge engineering, vol 1. IEEE, pp 1038–1042
Quinlan JR (1986) Induction of decision trees. Mach Learn 1(1):81–106
Hall MA, Smith LA (1998) Practical feature subset selection for machine learning, pp 181–191
Yang Y, Pedersen JO (1997) A comparative study on feature selection in text categorization. ICML 97(412–420):35
Singh A, Thakur N, Sharma A (2016) A review of supervised machine learning algorithms. In: 2016 3rd international conference on computing for sustainable global development (INDIACom). IEEE
Caruana R, Niculescu-Mizil A (2006) An empirical comparison of supervised learning algorithms. In: Proceedings of the 23rd international conference on machine learning
Catak F, Bilgem T (2015) Genetic algorithm based feature selection in high dimensional text dataset classification. WSEAS Trans Inf Sci Appl 12(28):290–296
Svetnik V et al (2003) Random forest: a classification and regression tool for compound classification and QSAR modeling. J Chem Inf Comput Sci 43(6):1947–1958
Ma Z, Kaban A (2013) K-Nearest-Neighbours with a novel similarity measure for intrusion detection. In: 2013 13th UK workshop on computational intelligence (UKCI). IEEE
Leung KM (2007) Naive bayesian classifier. Polytechnic University Department of Computer Science/Finance and Risk Engineering, pp 123–156
KDD99, KDD Cup 1999 Data (1999) Online: Accessed 26 July 2020. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 military communications and information systems conference (MilCIS). IEEE, pp 1–6
Moustafa N, Slay J (2016) The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J A Global Perspect 25(1–3):18–31
Garcia S, Grill M, Stiborek J, Zunino A (2014) An empirical comparison of botnet detection methods. Comput Secur 45:100–123
Gringoli F, Salgarelli L, Dusi M, Cascarano N, Risso F, Claffy KC (2009) GT: picking up the truth from the ground for internet traffic. ACM SIGCOMM Comput Commun Rev 39(5):12–18
Carela-Español V, Bujlow T, Barlet-Ros P (2014) Is our ground-truth for traffic classification reliable?. In: International conference on passive and active network measurement. Springer, Cham, pp 98–108
Moore A, Zuev D, Crogan M (2013) Discriminators for use in flow-based classification
Zhang H, Gang L, Qassrawi MT, Zhang Yu, Xiangzhan Yu (2012) Feature selection for optimizing traffic classification. Comput Commun 35(12):1457–1471
CSE-CIC-IDS2018 dataset. Online: Accessed 26 July 2020. https://www.unb.ca/cic/datasets/ids-2018.html
Ansari Md, Alam S, Pal K, Govil P, Govil MC, Awasthi LK (2022) A statistical analysis of SAMPARK dataset for peer-to-peer traffic and selfish-peer identification. Multimedia Tools Appl 1–29
Mahoney MV, Chan PK (2003) An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In: International workshop on recent advances in intrusion detection. Springer, Berlin, pp 220–237
Frank E, Hall M, Holmes G, Kirkby R, Pfahringer B, Witten IH, Trigg L (2009) Weka-a machine learning workbench for data mining. In: Data mining and knowledge discovery handbook. Springer, Boston, pp 1269–1277
Weka 3: Data mining software in java. Online Accessed 25 July 25 2020. https://www.cs.waikato.ac.nz/~ml/weka/
Fu W, Fu W (2019) Accelerator control data mining with WEKA. No. BNL-212159-2019-COPA. Brookhaven National Lab.(BNL), Upton, NY (United States)
Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M et al (2011) Scikit-learn: machine learning in Python. J Mach Learn Res 12:2825–2830
Kramer O (2016) Scikit-learn. In: Machine learning for evolution strategies. Springer, Cham, pp 45–53
Nelli F (2018) Machine learning with scikit-learn. In: Python data analytics. Apress, Berkeley, pp 313–347
Abadi M, Barham P, Chen J, Chen Z, Davis A, Dean J, Devin M et al (2016) Tensorflow: a system for large-scale machine learning. In: 12th USENIX symposium on operating systems design and implementation (OSDI 16), pp 265–283
Laghari AA, He H, Khan A, Kumar N, Kharel R (2018) Quality of experience framework for cloud computing (QoC). IEEE Access 6:64876–64890
Laghari AA, Jumani AK, Laghari RA (2021) Review and state of art of fog computing. Arch Comput Methods Eng 1–13
Laghari AA, Wu K, Laghari RA, Ali M, Khan AA (2021) A review and state of art of Internet of Things (IoT). Arch Comput Methods Eng 1–19
Mishra P, Varadharajan V, Tupakula U, Pilli ES (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tutor 21(1):686–728
Abadi M, Agarwal A, Barham P, Brevdo E, Chen Z, Citro C, Corrado GS et al (2016) Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467
Introducing TensorFlow Graphics: Computer Graphics Meets Deep Learning. Online: Accessed 25 July 2020. https://medium.com/tensorflow/introducing-tensorflow-graphics-computer-graphics-meets-deep-learning-c8e3877b7668
Mikut R, Reischl M (2011) Data mining tools. Wiley Interdiscip Rev Data Min Knowl Discov 1(5):431–443
Bartschat A, Reischl M, Mikut R (2019) Data mining tools. Wiley Interdiscip Rev Data Min Knowl Discov 9(4):e1309
Sperotto A, Sadre R, Van Vliet F, Pras A (2009) A labeled data set for flow-based intrusion detection. In: International workshop on IP operations and management. Springer, Berlin, pp 39–50
Olson DL, Delen D (2008) Advanced data mining techniques. Springer, Berlin
Nguyen Thuy TT, Armitage G (2008) A survey of techniques for internet traffic classification using machine learning. IEEE Commun Surv Tutor 10(4):56–76
Raahemi B, Zhong W, Liu J (2008) Peer-to-peer traffic identification by mining IP layer data streams using concept-adapting very fast decision tree. In: 2008 20th IEEE international conference on tools with artificial intelligence, vol 1. IEEE, pp 525–532
Wang Y (ed) (2008) Statistical techniques for network security: modern statistically-based intrusion detection and protection: modern statistically-based intrusion detection and protection. Igi Global
Karagiannis T, Papagiannaki K, Faloutsos M (2005) BLINC: multilevel traffic classification in the dark. In: Proceedings of the 2005 conference on applications, technologies, architectures, and protocols for computer communications, pp 229–240
Chakraborty B (2002) Genetic algorithm with fuzzy fitness function for feature selection. In: IEEE international symposium on industrial electronics (ISIE’02), vol 1, pp 315–319
Wang X, Yang J, Teng X, Xia W, Jensen R (2007) Feature selection based on rough sets and particle swarm optimization. Pattern Recogn Lett 28(4):459–471
Azevedo GLFBG, Cavalcanti GDC, Filho ECBC (2007) An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting. In: 2007 IEEE congress on evolutionary computation. IEEE, pp 3577–3584
Lin S-W, Ying K-C, Chen S-C, Lee Z-J (2008) Particle swarm optimization for parameter determination and feature selection of support vector machines. Expert Syst Appl 35(4):1817–1824
Huang C-L, Dun J-F (2008) A distributed PSO-SVM hybrid system with feature selection and parameter optimization. Appl Soft Comput 8(4):1381–1391
Yang C-S, Chuang L-Y, Li J-C, Yang C-H (2008) Chaotic maps in binary particle swarm optimization for feature selection. In: 2008 IEEE conference on soft computing in industrial applications. IEEE, pp 107–112
Chuang L-Y, Chang H-W, Chung-Jui T, Yang C-H (2008) Improved binary PSO for feature selection using gene expression data. Comput Biol Chem 32(1):29–38
Chuang L-Y, Tsai S-W, Yang C-H (2011) Improved binary particle swarm optimization using catfish effect for feature selection. Expert Syst Appl 38(10):12699–12707
Abdull HHN, Kasabov N, Shamsuddin SM (2011) Quantum-inspired particle swarm optimization for feature selection and parameter optimization in evolving spiking neural networks for classification tasks. InTech
Wu Q, Ma Z, Fan J, Gang X, Shen Y (2019) A feature selection method based on hybrid improved binary quantum particle swarm optimization. IEEE Access 7:80588–80601
Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of encrypted and vpn traffic using time-related. In: Proceedings of the 2nd international conference on information systems security and privacy (ICISSP), pp 407–414
Saber A, Fergani B, Abbas M (2018) Encrypted traffic classification: combining over-and under-sampling through a PCA-SVM. In: 2018 3rd international conference on pattern analysis and intelligent systems (PAIS). IEEE, pp 1–5
Ansari Md, Alam S, Pal K, Govil MC, Govil P, Srivastava A (2022) P2P traffic identification using machine learning and feature selection techniques. In: Edge analytics. Springer, Singapore, pp 393–407
Ansari Md, Alam S, Pal K, Govil MC, Govil P, Srivastava A (2021) Ensemble machine learning for P2P traffic identification. Int J Comput Digital Syst
Wiradinata T, Suryaputra PA (2016) Clustering and principal feature selection impact for internet traffic classification using K-NN. In: Proceedings of second international conference on electrical systems, technology and information 2015 (ICESTI 2015). Springer, Singapore, pp 75–81
Bhattacharya S, Kaluri R, Singh S, Alazab M, Tariq U (2020) A Novel PCA-Firefly based XGBoost classification model for Intrusion Detection in Networks using GPU. Electronics 9(2):219
Haase P, Siebes R, Van Harmelen F (2004) Peer selection in peer-to-peer networks with semantic topologies. In International conference on semantics for the networked world. Springer, Berlin, pp 108–125
Raja VR, Parag P, Shakkottai S (2019) Mode-suppression: a simple, stable and scalable chunk-sharing algorithm for P2P networks. arXiv preprint arXiv:1904.04191
Xu D, Hefeeda M, Hambrusch S, Bhargava B (2002) On peer-to-peer media streaming. In: Proceedings 22nd international conference on distributed computing systems. IEEE, pp 363–371
Shen H, Lin Y, Li J (2014) A social-network-aided efficient peer-to-peer live streaming system. IEEE/ACM Trans Netw 23(3):987–1000
Laghari AA, He H, Karim S, Shah HA, Karn NK (2017) Quality of experience assessment of video quality in social clouds. Wirel Commun Mobile Comput 2017
Laghari AA, He H, Memon KA, Laghari RA, Halepoto IA, Khan A (2019) Quality of experience (QoE) in cloud gaming models: a review. Multiagent Grid Syst 15(3):289–304
Krishnan R, Smith MD, Tang Z, Telang R (2004) The impact of free-riding on peer-to-peer networks. In: 37th annual Hawaii international conference on system sciences. Proceedings of the, pp 10-pp. IEEE
Ramaswamy L, Liu L (2003) Free riding: a new challenge to peer-to-peer file sharing systems. In: 36th annual Hawaii international conference on system sciences, 2003. Proceedings of the. IEEE, pp 10–pp
Alotibi B, Alarifi N, Abdulghani M, Altoaimy L (2019) Overcoming free-riding behavior in peer-to-peer networks using points system approach. Procedia Comput Sci 151:1060–1065
Dutta D, Goel A, Govindan R, Zhang H (2003) The design of a distributed rating scheme for peer-to-peer systems. In: Workshop on economics of peer-to-peer systems, vol 264, pp 214–223
Gupta R, Somani AK (2005) Game theory as a tool to strategize as well as predict nodes’ behavior in peer-to-peer networks. In: 11th international conference on parallel and distributed systems (ICPADS’05), vol 1. IEEE, pp 244–249
Hughes D, Coulson G, Walkerdine J (2005) Free riding on Gnutella revisited: the bell tolls?. IEEE Distributed Syst 6(6)
Ansari SA, Pal K, Govil MC, Ahmed M, Chawla T, Choudhary A (2021) Score-based Incentive Mechanism (SIM) for live multimedia streaming in peer-to-peer network. Multimedia Tools Appl 80(13):19263–19290
Zhang Q, Zhu L, Yang X (2018) A new incentive policy for improving data service in P2P networks. Wirel Pers Commun 103(1):231–245
Wu T-Y, Lee W-T, Guizani N, Wang T-M (2014) Incentive mechanism for P2P file sharing based on social network and game theory. J Netw Comput Appl 41:47–55
Zhou R, Hwang K (2007) Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18(4):460–473
Krishnan R et al (2004) The impact of free-riding on peer-to-peer networks. In: 37th annual Hawaii international conference on system sciences, 2004. Proceedings of the. IEEE
Ramaswamy L, Liu L (2003) Free riding: a new challenge to peer-to-peer file sharing systems. In: 36th annual Hawaii international conference on system sciences, 2003. Proceedings of the. IEEE
Samuvelraj G, Nalini N (2014) A survey of self organizing trust method to avoid malicious peers from peer to peer network. In: 2014 international conference on green computing communication and electrical engineering (ICGCCEE). IEEE, pp 1–4
Zhao D, Traore I, Ghorbani A, Sayed B, Saad S, Lu W (2012) Peer to peer botnet detection based on flow intervals. In: IFIP international information security conference. Springer, Berlin, pp 87–102
Beiknejad H, Vahdat-Nejad H, Moodi H (2018) P2P Botnet Detection Based on
Rahbarinia B, Perdisci R, Lanzi A, Li K (2014) Peerrush: mining for unwanted p2p traffic. J Inf Secur Appl 19(3):194–208
Su S-C, Chen Y-R, Tsai S-C, Lin Y-B (2018) Detecting p2p botnet in software defined networks. Secur Commun Netw 2018
Alauthman M, Aslam N, Al-Kasassbeh M, Khan S, Al-Qerem A, Choo K-KR (2020) An efficient reinforcement learning-based Botnet detection approach. J Netw Comput Appl 150:102479
Garg S, Singh AK, Sarje AK, Peddoju SK (2013) Behaviour analysis of machine learning algorithms for detecting P2P botnets. In: 2013 15th international conference on advanced computing technologies (ICACT). IEEE, pp 1–4
Khan RU, Zhang X, Kumar R, Sharif A, Golilarz NA, Alazab M (2019) An adaptive multi-layer botnet detection technique using machine learning classifiers. Appl Sci 9(11):2375
Ali M, Jung LT, Sodhro AH, Laghari AA, Belhaouari SB, Gillani Z (2023) A confidentiality-based data classification-as-a-service (C2aaS) for cloud security. Alex Eng J 64:749–760
Karim S, He H, Laghari AA, Magsi AH, Laghari RA (2021) Quality of service (QoS): measurements of image formats in social cloud computing. Multimedia Tools Appl 80:4507–4532
Laghari AA, He H, Shafiq M, Khan A (2018) Assessment of quality of experience (QoE) of image compression in social cloud computing. Multiagent Grid Syst 14(2):125–143
Ansari MdSA, Chattopadhayay A, Das S (2010) A kernel level vfs logger for building efficient file system intrusion detection system. In: 2010 second international conference on computer and network technology. IEEE, pp 273–279
Fujita S (2019) Flash crowd absorber for P2P video streaming. IEICE Trans Inf Syst 102(2):261–268
Li B, Keung GY, Xie S, Liu F, Sun Y, Yin H (2008) An empirical study of flash crowd dynamics in a p2p-based live video streaming system. In: IEEE GLOBECOM 2008-2008 IEEE global telecommunications conference. IEEE, pp 1–5
Chung TY, Lin O (2011) A batch join scheme for flash crowd reduction in IPTV systems. In: 2011 IEEE 17th international conference on parallel and distributed systems. IEEE, pp 823–828
Huang D, Zhang M, Zheng Y, Chen C, Huang Y (2015) Pre-allocation based flash crowd mitigation algorithm for large-scale content delivery system. Peer-to-Peer Netw Appl 8(3):493–500
Liu F, Li B, Zhong L, Li B, Jin H, Liao X (2011) Flash crowd in P2P live streaming systems: Fundamental characteristics and design implications. IEEE Trans Parallel Distrib Syst 23(7):1227–1239
de Paula Junior U, Drummond LMA, de Oliveira D, Frota Y, Barbosa VC (2015) Handling flash-crowd events to improve the performance of web applications. In Proceedings of the 30th annual ACM symposium on applied computing, pp 769–774
Pruteanu A, D’Acunto L, Dulman S (2013) Distributed online flash-crowd detection in P2P swarming systems. Comput Commun 36(5):533–541
Laghari AA, He H, Khan A, Laghari RA, Yin S, Wang J (2022) Crowdsourcing platform for QoE evaluation for cloud multimedia services. Comput Sci Inf Syst 38
Chen Y, Zhang B, Chen C(2011) Modeling and performance analysis of P2P live streaming systems under flash crowds. In: 2011 IEEE international conference on communications (ICC). IEEE
Menth M, Lehrieder F (2012) Performance of PCN-based admission control under challenging conditions. IEEE/ACM Trans Netw 20(2):422–435
Wu H, Liu J, Jiang H, Sun Y, Li J, Li Z (2012) Bandwidth-aware peer selection for P2P live streaming systems under flash crowds. In: 2012 IEEE 31st international performance computing and communications conference (IPCCC). IEEE, pp 360–367
Rückert J, Richerzhagen B, Lidanski E, Steinmetz R, Hausheer D (2015) Topt: supporting flash crowd events in hybrid overlay-based live streaming. In: 2015 IFIP networking conference (IFIP networking). IEEE, pp 1–9
Wu H, Jiang H, Liu J, Sun Y, Li J, Li Z (2011) How P2P live streaming systems scale quickly under a flash crowd?. In: 30th IEEE international performance computing and communications conference. IEEE, pp 1–8
Liu F et al (2011) Flash crowd in P2P live streaming systems: fundamental characteristics and design implications. IEEE Trans Parallel Distrib Syst 23(7):1227–1239
Miguel EC, Cunha I, Silva CM, Carvalho F, Campos SVA (2017) Resource-constrained P2P streaming overlay construction for efficient joining under flash crowds. In: 2017 IEEE symposium on computers and communications (ISCC). IEEE, pp 639–644
Jia S, Jiang S, Li Y, Zhi X, Wang M (2015) A novel interest detection-based video dissemination algorithm under flash crowd in mobile ad hoc networks. Int J Distrib Sens Netw 11(6):239267
Fujita S (2019) Flash crowd absorber for P2P video streaming. IEICE Trans Inf Syst 102(2):261–268
Funding
No financial funding was received for the research, authoring, and publication of this article.
Author information
Authors and Affiliations
Contributions
All authors have made an equal contribution to transforming the manuscript into a significant research paper.
Corresponding author
Ethics declarations
Conflict of interest
No conflicts of interest need to be revealed.
Ethics approval
The content presented here is entirely original and has not been published previously by the authors.
Consent to participate
It is confirmed that all authors have reviewed and consented to the submitted version of the paper, and they have agreed to be listed as co-authors.
Consent for publication
The author(s) hereby provide(s) permission for the Work to be published.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ansari, M.S.A., Pal, K. & Govil, M.C. Revisiting of peer-to-peer traffic: taxonomy, applications, identification techniques, new trends and challenges. Knowl Inf Syst 65, 4479–4536 (2023). https://doi.org/10.1007/s10115-023-01915-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10115-023-01915-5