Skip to main content
Log in

CUFTI: Methods for core users finding and traffic identification in P2P systems

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Peer-to-Peer system has achieved great success with millions of end users in the past several years. P2P traffic has occupied about 60–80 % of the total traffic volumes, which greatly consumes network bandwidth and causes congestions. To achieve the goal of efficacious P2P system management in the monitored network, in this paper we develop a framework named CUFTI (Core Users Finding and Traffic Identification). The core users are referred as long-lived peers, and we focus on life-time characteristics of coexisting peers within each snapshot of the overlay. Based on the analysis results of user’s behaviour in PPlive system, we develop an accurate model to forecast the peer’s residual life-time and identify the long-lived peers. Furthermore, we develop a flow identification model for P2P traffic management of those core users. Based on the analysis results of actual traffic traces, we find the P2P traffic flows are composed of data and control packets. Most of the control packets appear at the beginning and end of each flow to establish and close the communication between peers. We employ the direction and payload length of the control packets at the beginning of the flow as features to perform flow identification. Experimental results based on traces collected from the Northwest Region Center of CERNET (China Education and Research Network) show that the newly developed methods outperforms other existing methods with lower false negative rate (FNR) and false positive rate (FPR).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Sandvine (2013) http://www.sandvine.com/news/global_broadband_trends.asp

  2. Zhai H, Wong A, Jiang H, Sun Y, Li J (2011) Optimal P2P Cache Sizing: A Monetary Cost Perspective on Capacity Design of Caches to Reduce P2P Traffic. In Proceedings of IEEE 17th International Conference on Parallel and Distributed Systems, pp 565–572

  3. Liu J, Rao S G, Li B, Zhang H (2008) Opportunities and Challenges of Peer-to-Peer Internet Video Broadcast. In Proceedings of the IEEE Special Issue on Recent Advances in Distributed Multimedia Communications, pp 11–24

  4. Hei X, Liu Y, Ross KW (2007) Inferring network-wide quality in P2P live streaming systems. IEEE J Sel Areas in Commun 10(25):1640–1654

    Google Scholar 

  5. Liu Z, Wu C, Li B, Zhao S (2009) Distilling Superior Peers in Large-Scale P2P Streaming Systems. In Proceedings of the 28th IEEE INFOCOM, pp 82–90

  6. Sirivianos M, Park J, Chen R, Yang X (2007) Free-riding in Bit-torrent networks with the large view exploit. In Proceedings of 6th International Workshop on Peer-to-Peer Systems

  7. Guo L, Chen S, Tan E, Ding X, Zhang X (2005) Measurements, Analysis, and Modeling of BitTorrent-like Systems. In Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, pp 35–48

  8. Hei X, Liang C, Liang J, Liu Y, Ross KW (2007) A measurement study of a large-scale P2P IPTV system. IEEE Trans Multimedia 8(9):11–24

    Google Scholar 

  9. Long V, Indranil G, Klara N, Jin L (2009) Understanding overlay characteristics of a large-scale peer-to-peer IPTV system. ACM Trans Multimed Comput Commun Appl 4(6):2010–2035

    Google Scholar 

  10. Kwon C, Song H (2011) A robust P2P video multicast streaming system under high peer-churn rate, In Proceedings of IEEE 13th International Conference on Communication Technology. pp 843–848

  11. Jiang X, Safaei F (2011) Churn performance study of structured peer-to-peer overlay in supporting massively multiplayer online role playing games. In Proceedings of 17th IEEE International Conference on Networks. pp 183–188

  12. Hu C, Chen D (2011) Distributed pairing for file sharing in large-scale peer-to-peer networks, In Proceedings of International Conference on Advanced Communication Technology, pp 492–497

  13. Wang F, Liu J, Xiong Y (2008) Stable Peers: Existence, Importance, and Application in Peer-to-Peer Live Video Streaming. In Proceedings of the IEEE Annual International Conference on Computer Communications, pp 1364–1372

  14. Bishop M, Rao S, Sripanidkulchai K (2006) Considering Priority in Overlay Multicast Protocols under Heterogeneous Environments. In Proceedings of the 25th IEEE INFOCOM, pp 1–13

  15. Stutzbach D, Rejaie R (2006) Understanding Churn in Peer-to-Peer Networks, In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, pp 189–202

  16. Sen S, Wang J (2004) Analyzing peer-to-peer traffic across large networks. IEEE/ACM Trans Networking 12(2):219–232

    Article  Google Scholar 

  17. Gerber A, Houle J, Nguyen H, Roughan M, Sen, S (2003) P2P The Gorilla in the Cable. In Proceedings of National Cable &Telecommunications Association National Show

  18. Sen S, Spatscheck O, Wang D (2004) Accurate, scalable in-network identification of P2P traffic using application signatures. In Proceedings of the 13th international conference on World Wide Web

  19. Karagiannis T, Broido A, Brownlee N, Claffy K, Faloutsos M (2004) Is P2P dying or just hiding? In Proceedings of IEEE Globecom–Global Internet and Next Generation Networks

  20. Constantinou F, Mavrommatis P (2006) Identifying Known and Unknown Peer-to-Peer Traffic. In Proceedings of Fifth IEEE International Symposium on Network Computing and Applications

  21. Roughan M, Sen S, Spatscheck O, Duffield N (2004) Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification. In Proceedings of ACM SIGCOMM Internet Measurement Conference

  22. Moore A, Zuev D (2005) Internet traffic classification using Bayesian analysis. In Proceedings of International Conference on Measurement and Modeling of Computer Systems

  23. Jin Y, Duffield N, Haffner P, Sen S, Zhang Z-L (2010) Inferring applications at the network layer using collective traffic statistics. In Proceedings of the 22nd International Tele traffic Congress

  24. Iliofotou M, Gallagher B, Eliassi-Rad T, Xie G, Faloutsos M (2010) Profiling-by-association: a resilient traffic profiling solution for the internet backbone. In Proceedings of the 6th International Conference on emerging networking experiments and technologies

  25. Jaber M, Cascella G, Barakat C (2012) Using host profiling to refine statistical application identification, In Proceedings of 2012 I.E. INFOCOM, pp 2746–2750

  26. Finamore A, Mellia M, Meo M (2011) Mining Unclassified Traffic Using Automatic Clustering Techniques. In Proceeding of the Third international conference on Traffic monitoring and analysis, pp 150–163

  27. Dainotti A, Pescapé A, Sansone C (2011) Early Classification of Network Traffic through Multi-classification. In Proceedings of the Third international conference on Traffic monitoring and analysis, pp 122–135

  28. Bernaille L, Teixeira R, Akodkenou I (2006) Traffic classification on the fly. Comput Commun Rev 36(2):23–26

    Article  Google Scholar 

  29. Haffner P, Sen S, Spatscheck O, Wang D (2005) ACAS: Automated construction of application signatures. In Proceedings of Workshop on Mining Network Data

  30. Keys K, Moore D, Koga R, Lagache E, Tesch M, Claffy K (2001) The Architecture of the CoralReef: Internet Traffic Monitoring Software Suite. In Proceedings of the Passive and Active Measurement Workshop

  31. Nskeylab (2013) http://nskeylab.xjtu.edu.cn/people/tqin/

  32. Guan X, Qin T, Li W, Wang P (2010) Dynamic feature analysis and measurement for large-scale network monitoring. IEEE Trans Inf Forensics Secur 5(4):905–919

    Article  Google Scholar 

Download references

Acknowledgment

The research presented in this paper is supported in part by the National Natural Science Foundation of China (61221063, 61103240), the Application Foundation Research Program of SuZhou (SYG201227), the Natural Science Foundation of Jiangsu Province (SBK2014021758) and the Fundamental Research Funds for the Central University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tao Qin.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qin, T., Wang, L., Zhao, D. et al. CUFTI: Methods for core users finding and traffic identification in P2P systems. Peer-to-Peer Netw. Appl. 9, 424–435 (2016). https://doi.org/10.1007/s12083-015-0350-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-015-0350-2

Keywords

Navigation