skip to main content
research-article

Detection and classification of peer-to-peer traffic: A survey

Authors Info & Claims
Published:03 July 2013Publication History
Skip Abstract Section

Abstract

The emergence of new Internet paradigms has changed the common properties of network data, increasing the bandwidth consumption and balancing traffic in both directions. These facts raise important challenges, making it necessary to devise effective solutions for managing network traffic. Since traditional methods are rather ineffective and easily bypassed, particular attention has been paid to the development of new approaches for traffic classification. This article surveys the studies on peer-to-peer traffic detection and classification, making an extended review of the literature. Furthermore, it provides a comprehensive analysis of the concepts and strategies for network monitoring.

References

  1. Adami, D., Callegari, C., Giordano, S., Pagano, M., and Pepe, T. 2009. A real-time algorithm for Skype traffic detection and classification. In Proceedings of the 9th International Conference on Next Generation Wired/Wireless Networking (NEW2AN'09). Lecture Notes in Computer Science, vol. 5764. Springer-Verlag, Berlin Heidelberg, 168--179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Allman, M. and Paxson, V. 2007. Issues and etiquette concerning use of shared measurement data. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC'07). ACM, New York, NY, 135--140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Amer, P. D. and Cassel, L. N. 1989. Management of sampled real-time network measurements. In Proceedings of the 14th IEEE Conference on Local Computer Networks (LCN'89). IEEE Press, New York, NY, 62--68.Google ScholarGoogle Scholar
  4. Angevine, D. and Zincir-Heywood, A. N. 2008. A preliminary investigation of Skype traffic classification using a minimalist feature set. In Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES'08). IEEE Computer Society Press, 1075--1079. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Antoniades, D., Polychronakis, M., Antonatos, S., Markatos, E. P., Ubik, S., and Øslebø, A. 2006. Appmon: An application for accurate per application network traffic characterization. In Proceedings of the IST Broadband Europe Conference.Google ScholarGoogle Scholar
  6. Apisdorf, J., Claffy, K. C., Thompson, K., and Wilder, R. 1996. OC3MON: Flexible, affordable, high performance statistics collection. In Proceedings of the 10th USENIX Systems Administration Conference (LISA'96). USENIX Association, Berkeley, CA, 97--112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Appmon. 2010. Appmon description. http://lobster.ics.forth.gr/∼appmon/appmon_description.html. (Last accessed 3/10).Google ScholarGoogle Scholar
  8. Arlitt, M. and Williamson, C. 2007. The extensive challenges of Internet application measurement. IEEE Netw. 21, 3, 41--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Auld, T., Moore, A. W., and Gull, S. F. 2007. Bayesian neural networks for Internet traffic classification. IEEE Trans. Neural Netw. 18, 1, 223--239. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Azzouna, N. B. and Guillemin, F. 2003. Analysis of ADSL traffic on an IP backbone link. In Proceedings of the IEEE Global Communications Conference (GlobeCom'03), Vol. 7. IEEE, 3742--3746.Google ScholarGoogle Scholar
  11. Baldi, M., Baldini, A., Cascarano, N., and Risso, F. 2009. Service-based traffic classification: Principles and validation. In Proceedings of the IEEE Sarnoff Symposium (SARNOFF'09). IEEE Press, Piscataway, NJ, 115--120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Bartlett, G., Heidemann, J., and Papadopoulos, C. 2007a. Inherent behaviors for on-line detection of peer-to-peer file sharing. In Proceedings of the IEEE Global Internet Symposium. IEEE, 55--60.Google ScholarGoogle Scholar
  13. Bartlett, G., Heidemann, J., and Papadopoulos, C. 2007b. Understanding passive and active service discovery. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC'07). ACM, New York, NY, 57--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Basher, N., Mahanti, A., Mahanti, A., Williamson, C., and Arlitt, M. 2008. A comparative analysis of web and peer-to-peer traffic. In Proceedings of the 17th International Conference on World Wide Web (WWW'08). ACM, New York, NY, 287--296. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Bernaille, L. and Teixeira, R. 2007. Early recognition of encrypted applications. In Proceedings of the Passive and Active Measurement Conference (PAM'07). Lecture Notes in Computer Science, vol. 4427, Springer-Verlag, Berlin Heidelberg, 165--175. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Bernaille, L., Teixeira, R., Akodjenou, I., Soule, A., and Salamatian, K. 2006a. Traffic classification on the fly. ACM SIGCOMM Comput. Commun. Rev. 36, 2, 23--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Bernaille, L., Teixeira, R., and Salamatian, K. 2006b. Early application identification. In Proceedings of the 2nd Conference on Future Networking Technologies (CoNEXT'06). ACM, 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Bin, L., Zhi-Tang, L., and Hao, T. 2007. A methodology for P2P traffic measurement using application signature work-in-progress. In Proceedings of the 2nd International Conference on Scalable Information Systems (InfoScale'07), vol. 304. ICST, Brussels, Belgium, 1--2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Bonfiglio, D., Mellia, M., Meo, M., Rossi, D., and Tofanelli, P. 2007. Revealing Skype traffic: When randomness plays with you. ACM SIGCOMM Comput. Commun. Rev. 37, 4, 37--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Branch, P. A., Heyde, A., and Armitage, G. J. 2009. Rapid identification of Skype traffic flows. In Proceedings of the 18th International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV'09). ACM, New York, NY, 91--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Bro. 2010. Bro intrusion detection system. http://bro-ids.org. (Last accessed 3/10).Google ScholarGoogle Scholar
  22. Cáceres, R., Duffield, N., Feldmann, A., Friedmann, J. D., Greenberg, A., Greer, R., Johnson, T., Kalmanek, C. R., Krishnamurthy, B., Lavelle, D., Mishra, P. P., Rexford, J., Ramakrishnan, K. K., True, F. D., and van der Merwe, J. E. 2000. Measurement and analysis of IP network usage and behavior. IEEE Commun. Mag. 38, 5, 144--151. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Callado, A., Kamienski, C., Szabó, G., Gero, B. P., Kelner, J., Fernandes, S., and Sadok, D. 2009. A survey on Internet traffic identification. IEEE Commun. Surveys Tuts. 11, 3, 37--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Callado, A., Kelner, J., Sadok, D., Kamienski, C. A., and Fernandes, S. 2010. Better network traffic identification through the independent combination of techniques. J. Netw. Comput. Appl. 33, 4, 433--446. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Canini, M., Li, W., Moore, A. W., and Bolla, R. 2009. GTVS: Boosting the collection of application traffic ground truth. In Proceedings of the 1st International Workshop on Traffic Monitoring and Analysis (TMA'09). Springer Verlag, Heidelberg, Germany, 54--63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Cao, J., Chen, A., Widjaja, I., and Zhou, N. 2008. Online identification of applications using statistical behavior analysis. In Proceedings of the IEEE Global Telecommunications Conference (GlobeCom'08). IEEE, 1--6.Google ScholarGoogle Scholar
  27. Carvalho, D. A., Pereira, M., and Freire, M. M. 2009a. Detection of peer-to-peer TV traffic through deep packet inspection. In Acta da 9ª Conference sobre Redes de Computadores. INESC-ID and Instituto Superior Técnico, 6.Google ScholarGoogle Scholar
  28. Carvalho, D. A., Pereira, M., and Freire, M. M. 2009b. Towards the detection of encrypted BitTorrent traffic through deep packet inspection. In Proceedings of the International Conference on Security Technology (SecTech'09). Communications in Computer and Information Science Series, vol. 58, Springer-Verlag, Berlin Heidelberg, 265--272.Google ScholarGoogle Scholar
  29. Cascarano, N., Ciminiera, L., and Risso, F. 2010a. Improving cost and accuracy of DPI traffic classifiers. In Proceedings of the 25th ACM Symposium on Applied Computing (SAC'10). ACM, New York, NY, 641--646. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Cascarano, N., Este, A., Gringoli, F., Risso, F., and Salgarelli, L. 2009. An experimental evaluation of the computational cost of a DPI traffic classifier. In Proceedings of the IEEE Global Communications Conference (GlobeCom'09). IEEE, 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Cascarano, N., Risso, F., Este, A., Gringoli, F., Finamore, A., and Mellia, M. 2010b. Comparing P2PTV traffic classifiers. In Proceedings of the IEEE International Conference on Communications (ICC'10). IEEE, 1--6.Google ScholarGoogle Scholar
  32. Cavallaro, L., Lanzi, A., Mayer, L., and Monga, M. 2008. LISABETH: Automated content-based signature generator for zero-day polymorphic worms. In Proceedings of the 4th International Workshop on Software Engineering for Secure Systems (SESS'08). ACM, New York, NY, 41--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Choi, K. and Choi, J. K. 2006. Pattern matching of packet payload for network traffic classification. In Proceedings of the Joint International Conference on Optical Internet and Next Generation Network (COIN-NGNCON'06). IEEE, 130--132.Google ScholarGoogle Scholar
  34. Chopra, D., Schulzrinne, H., Marocco, E., and Ivov, E. 2009. Peer-to-peer overlays for real-time communication: Security issues and solutions. IEEE Commun. Surv. Tut. 11, 1, 4--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Cisco NetFlow. 2010. http://www.cisco.com/web/go/netflow. (Last accessed 3/10).Google ScholarGoogle Scholar
  36. Claffy, K. C., Braun, H.-W., and Polyzos, G. C. 1995. A parameterizable methodology for Internet traffic flow profiling. IEEE J. Sel. Areas Commun. 13, 8, 1481--1494. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Claffy, K. C. and McCreary, S. 1999. Internet measurement and data analysis: Passive and active measurement. Am. Stat. Assoc.Google ScholarGoogle Scholar
  38. Constantinou, F. and Mavrommatis, P. 2006. Identifying known and unknown peer-to-peer traffic. In Proceedings of 5th IEEE International Symposium on Network Computing and Applications (NCA'06). IEEE, 93--102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Couto, A., Nogueira, A., Salvador, P., and Valadas, R. 2008. Identification of peer-to-peer applications' flow patterns. In Proceedings of the Conference on Next Generation Internet Networks (NGI'08). IEEE, 292--299.Google ScholarGoogle Scholar
  40. Crotti, M., Dusi, M., Gringoli, F., and Salgarelli, L. 2007. Traffic classification through simple statistical fingerprinting. ACM SIGCOMM Comput. Commun. Rev. 37, 1, 5--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Crotti, M., Gringoli, F., Pelosato, P., and Salgarelli, L. 2006. A statistical approach to IP-level classification of network traffic. In Proceedings of the IEEE International Conference on Communications (ICC'06), Vol. 1. IEEE, 170--176.Google ScholarGoogle Scholar
  42. Crovella, M. and Krishnamurthy, B. 2006. Internet Measurement: Infrastructure, Traffic and Applications. John Wiley & Sons, Inc., New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Dainotti, A., de Donato, W., Pescapè, A., and Rossi, P. S. 2008. Classification of network traffic via packet-level hidden markov models. In Proceedings of the IEEE Global Telecommunications Conference (GlobeCom'08). IEEE, 1--5.Google ScholarGoogle Scholar
  44. Dainotti, A., de Donato, W., Pescapé, A., and Ventre, G. 2009. TIE: A community-oriented traffic classification platform. In Proceedings of the 1st International Workshop on Traffic Monitoring and Analysis (TMA'09). Lecture Notes in Computer Science, vol. 5537, Springer-Verlag, Berlin Heidelberg, 64--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Dedinski, I., Meer, H. D., Han, L., Mathy, L., Pezaros, D. P., Sventek, J. S., and Xiaoying, Z. 2005. Cross-layer peer-to-peer traffic identification and optimization based on active networking. In Proceedings of the 7th Annual International Working Conference on Active and Programmable Networks (IWAN'05). Springer-Verlag, Berlin Heidelberg, 13--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Dewes, C., Wichmann, A., and Feldmann, A. 2003. An analysis of Internet chat systems. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC'03). ACM, New York, NY, 51--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Dhamankar, R. and King, R. 2007. Protocol identification via statistical analysis (PISA). White Paper, Tipping Point.Google ScholarGoogle Scholar
  48. Duffield, N., Lund, C., and Thorup, M. 2005. Estimating flow distributions from sampled flow statistics. IEEE/ACM Trans. Netw. 13, 5, 933--946. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Duffield, N. G. 2004. Sampling for passive Internet measurement: A review. Stati. Sci. 19, 3, 472--498.Google ScholarGoogle Scholar
  50. Dusi, M., Crotti, M., Gringoli, F., and Salgarelli, L. 2008. Detection of encrypted tunnels across network boundaries. In Proceedings of the IEEE International Conference on Communications (ICC'08). IEEE, 1738--1744.Google ScholarGoogle Scholar
  51. Dusi, M., Crotti, M., Gringoli, F., and Salgarelli, L. 2009. Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting. Comput. Netw. 53, 1, 81--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Early, J. P., Brodley, C. E., and Rosenberg, C. 2003. Behavioral authentication of server flows. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC'03). IEEE Computer Society, Los Alamitos, CA, 46--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Ehlert, S. and Petgang, S. 2006. Analysis and signature of Skype VoIP session traffic. Tech. rep. NGNI-SKYPE-06b, Fraunhofer FOKUS, Berlin, Germany. July.Google ScholarGoogle Scholar
  54. Endace. 2011. Enterprise network monitoring tools--network security system--application performance monitoring. http://www.endace.com. (Last accessed 7/11).Google ScholarGoogle Scholar
  55. Erman, J., Arlitt, M., and Mahanti, A. 2006a. Traffic classification using clustering algorithms. In Proceedings of the ACM SIGCOMM Workshop on Mining Network Data (MineNet'06). ACM, New York, NY, 281--286. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Erman, J., Mahanti, A., and Arlitt, M. 2006b. Internet traffic identification using machine learning. In Proceedings of the IEEE Global Telecommunications Conference (GlobeCom'06). IEEE, 1--6.Google ScholarGoogle Scholar
  57. Erman, J., Mahanti, A., Arlitt, M., Cohen, I., and Williamson, C. 2007a. Offline/realtime traffic classification using semi-supervised learning. Perform. Eval. 64, 9-12, 1194--1213. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Erman, J., Mahanti, A., Arlitt, M., and Williamson, C. 2007b. Identifying and discriminating between web and peer-to-peer traffic in the network core. In Proceedings of the 16th International Conference on World Wide Web (WWW'07). ACM Press, New York, NY, 883--892. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Este, A., Gargiulo, F., Gringoli, F., Salgarelli, L., and Sansone, C. 2008. Pattern recognition approaches for classifying IP flows. In Proceedings of the Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition (SSPR & SPR'08). Lecture Notes in Computer Science, vol. 5342, Springer-Verlag, Berlin Heidelberg, 885--895. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Este, A., Gringoli, F., and Salgarelli, L. 2009. Support vector machines for TCP traffic classification. Comput. Netw. 53, 14, 2476--2490. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Ettercap. 2010. http://ettercap.sourceforge.net. (Last accessed 3/10).Google ScholarGoogle Scholar
  62. Finamore, A., Mellia, M., Meo, M., and Rossi, D. 2009. KISS: Stochastic packet inspection. In Proceedings of the 1st International Workshop on Traffic Monitoring and Analysis (TMA'09). Lecture Notes in Computer Science, vol. 5537, Springer-Verlag, Berlin Heidelberg, 117--125. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Fraleigh, C., Moon, S., Lyles, B., Cotton, C., Khan, M., Moll, D., Rockell, R., Seely, T., and Diot, C. 2003. Packet-level traffic measurements from the Sprint IP backbone. IEEE Netw. 17, 6, 6--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Freire, E. P., Ziviani, A., and Salles, R. M. 2008a. Detecting Skype flows in web traffic. In Proceedings of the IEEE Network Operations and Management Symposium (NOMS'08). IEEE, 89--96.Google ScholarGoogle Scholar
  65. Freire, E. P., Ziviani, A., and Salles, R. M. 2008b. Detecting VoIP calls hidden in web traffic. IEEE Trans. Netw. Service Manag. 5, 4, 204--214. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Freire, M. M., Carvalho, D. A., and Pereira, M. 2009. Detection of encrypted traffic in eDonkey network through application signatures. In Proceedings of the 1st International Conference on Advances in P2P Systems (AP2PS'09). IEEE Computer Society Press, Los Alamitos, CA, 174--179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Gerber, A., Houle, J., Nguyen, H., Roughan, M., and Sen, S. 2003. P2P, the gorilla in the cable. In Proceedings of the National Cable & Telecommunications Association (NCTA). 8--11.Google ScholarGoogle Scholar
  68. Gomes, J. V. P., Inácio, P. R. M., Freire, M. M., Pereira, M., and Monteiro, P. P. 2008. Analysis of peer-to-peer traffic using a behavioural method based on entropy. In Proceedings of the 27th IEEE International Performance Computing and Communications Conference (IPCCC'08). IEEE Computer Society Press, Los Alamitos, CA, 201--208.Google ScholarGoogle Scholar
  69. Gonzá1ez-Castaño, F. J., Rodríguez-Hernández, P. S., Martínez-Álvarez, R. P., Gómez, A., López-Cabido, I., and Villasuso-Barreiro, J. 2006. Support vector machine detection of peer-to-peer traffic. In Proceedings of IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA'06). IEEE, 103--108.Google ScholarGoogle Scholar
  70. Gringoli, F., Salgarelli, L., Dusi, M., Cascarano, N., Risso, F., and Claffy, K. C. 2009. GT: Picking up the truth from the ground for Internet traffic. ACM SIGCOMM Comput. Commun. Rev. 39, 5, 13--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Guo, Z. and Qiu, Z. 2008. Identification peer-to-peer traffic for high speed networks using packet sampling and application signatures. In Proceedings of the 9th International Conference on Signal Processing (ICSP'08). IEEE, 2013--2019.Google ScholarGoogle Scholar
  72. Haffner, P., Sen, S., Spatscheck, O., and Wang, D. 2005. ACAS: Automated construction of application signatures. In Proceedings of the ACM SIGCOMM Workshop on Mining Network Data (MineNet'05). ACM, New York, NY, 197--202. Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., and Witten, I. H. 2009. The WEKA data mining software: An update. ACM SIGKDD Explor. Newsl. 11, 1, 10--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Hu, Y., Chiu, D.-M., and Lui, J. C. S. 2008. Application identification based on network behavioral profiles. In Proceedings of the 16th International Workshop on Quality of Service (IWQoS'08). IEEE, 219--228.Google ScholarGoogle Scholar
  75. Hu, Y., Chiu, D.-M., and Lui, J. C. S. 2009. Profiling and identification of P2P traffic. Comput. Netw. 53, 6, 849--863. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Huang, N.-F., Jai, G.-Y., and Chao, H.-C. 2008. Early identifying application traffic with application characteristics. In Proceedings of the IEEE International Conference on Communications (ICC'08). IEEE, 5788--5792.Google ScholarGoogle Scholar
  77. IANA. 2011. Port numbers. http://www.iana.org. (Last accessed 6/11).Google ScholarGoogle Scholar
  78. IETF. 2008. Specification of the IP flow information export (IPFIX) protocol for the exchange of IP traffic flow information. RFC 5101. http://tools.ietf.org/html/rfc5101.Google ScholarGoogle Scholar
  79. Iliofotou, M., Kim, H.-C., Faloutsos, M., Mitzenmacher, M., Pappu, P., and Varghese, G. 2009. Graph-based P2P traffic classification at the Internet backbone. In Proceedings of the 28th IEEE International Conference on Computer Communications Workshops (InfoCom'09). IEEE Press, Piscataway, NJ, 37--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Iliofotou, M., Pappu, P., Faloutsos, M., Mitzenmacher, M., Singh, S., and Varghese, G. 2007. Network monitoring using traffic dispersion graphs (TDGs). In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC'07). ACM, New York, NY, 315--320. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Iliofotou, M., Pappu, P., Faloutsos, M., Mitzenmacher, M., Varghese, G., and Kim, H. 2008. Graption: Automated detection of P2P applications using traffic dispersion graphs (TDGs). Tech. rep. UCR-CS-2008-06080. June.Google ScholarGoogle Scholar
  82. Inoue, H., Jansens, D., Hijazi, A., and Somayaji, A. 2007. NetADHICT: A tool for understanding network traffic. In Proceedings of the 21st Large Installation System Administration Conference (LISA'07). USENIX Association, 39--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. ipoque. 2011. Bandwidth management with deep packet inspection. http://www.ipoque.com. (Last accessed 7/11).Google ScholarGoogle Scholar
  84. Jain, R. and Routhier, S. A. 1986. Packet trains--measurements and a new model for computer network traffic. IEEE J. Sel. Areas Commun. 4, 6, 986--995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. John, W. and Tafvelin, S. 2008. Heuristics to classify Internet backbone traffic based on connection patterns. In Proceedings of the International Conference on Information Networking (ICOIN'08). IEEE, 1--5.Google ScholarGoogle Scholar
  86. Johnson, M. E., McGuire, D., and Willey, N. D. 2008. The evolution of the peer-to-peer file sharing industry and the security risks for users. In Proceedings of the Proceedings of the 41st Hawaii International Conference on System Sciences (HICSS'08). IEEE Computer Society, Washington, DC. Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Johnson, M. E., McGuire, D., and Willey, N. D. 2009. Why file sharing networks are dangerous? Commun. ACM 52, 2, 134--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Jurga, R. E. and Hulbój, M. M. 2007. Packet sampling for network monitoring. Tech. rep., CERN — HP Procurve openlab project. Dec.Google ScholarGoogle Scholar
  89. Karagiannis, T., Broido, A., Brownlee, N., Claffy, K., and Faloutsos, M. 2004a. File-sharing in the Internet: A characterization of P2P traffic in the backbone. Tech. rep.Google ScholarGoogle Scholar
  90. Karagiannis, T., Broido, A., Brownlee, N., Claffy, K. C., and Faloutsos, M. 2004b. Is P2P dying or just hiding? In Proceedings of the IEEE Global Telecommunications Conference (GlobeCom'04), Vol. 3. IEEE Computer Society Press, Piscataway, NJ, 1532--1538.Google ScholarGoogle Scholar
  91. Karagiannis, T., Faloutsos, A. B. M., and Claffy, K. C. 2004c. Transport layer identification of P2P traffic. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC'04). ACM, New York, NY, 121--134. Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. Karagiannis, T., Papagiannaki, K., and Faloutsos, M. 2005a. BLINC: Multilevel traffic classification in the dark. In Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Vol. 35. ACM, New York, NY, 229--240. Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. Karagiannis, T., Rodriguez, P., and Papagiannaki, K. 2005b. Should Internet service providers fear peer-assisted content distribution? In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC'05). USENIX Association, Berkeley, CA, 63--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Kim, H., Claffy, K. C., Fomenkov, M., Barman, D., Faloutsos, M., and Lee, K. 2008. Internet traffic classification demystified: Myths, caveats, and the best practices. In Proceedings of the ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT'08). ACM, New York, NY, 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Kim, H.-C., Fomenkov, M., Brownlee, N., Claffy, K. C., Barman, D., and Faloutsos, M. 2007. Comparison of Internet traffic classification tools. In Proceedings of the Workshop on Application Classification and Identification (WACI).Google ScholarGoogle Scholar
  96. Kind, A., Dimitropoulos, X., Denazis, S., and Claise, B. 2008. Advanced network monitoring brings life to the awareness plane. IEEE Commun. Mag. 46, 10, 140--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. Krishnamurthy, B. and Wang, J. 2002. Traffic classification for application specific peering. In Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop (IMW'02). ACM, New York, NY, 179--180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Kumar, S., Dharmapurikar, S., Yu, F., Crowley, P., and Turner, J. 2006. Algorithms to accelerate multiple regular expressions matching for deep packet inspection. ACM SIGCOMM Comput. Commun. Rev. 36, 4, 339--350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. L7-filter. 2010. L7-filter, application layer packet classifier for Linux. http://l7-filter.sourceforge.net. (Last accessed 3/10).Google ScholarGoogle Scholar
  100. l7-netpdlclassifier. 2010. Tools for L2-L7 traffic classification. http://netgroup.polito.it/research-projects/l7-traffic-classification/. (Last accessed 3/10).Google ScholarGoogle Scholar
  101. Lakhina, A., Crovella, M., and Diot, C. 2005. Mining anomalies using traffic feature distributions. ACM SIGCOMM Comput. Commun. Rev. 35, 4, 217--228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. Lawton, G. 2004. Is peer-to-peer secure enough for corporate use? IEEE Comput. 37, 1, 22--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. Leibowitz, N., Bergman, A., Ben-Shaul, R., and Shavit, A. 2002. Are file swapping networks cacheable? Characterizing P2P traffic. In Proceedings of the 7th International Workshop on Web Content Caching and Distribution (WCW).Google ScholarGoogle Scholar
  104. Li, T., Guan, Z., and Wu, X. 2007. Modeling and analyzing the spread of active worms based on P2P systems. Comput. Security 26, 3, 213--218.Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Li, W., Canini, M., Moore, A. W., and Bolla, R. 2009. Efficient application identification and the temporal and spatial stability of classification schema. Comput. Netw. 53, 6, 790--809. Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. Lin, Y.-D., Lu, C.-N., Lai, Y.-C., Peng, W.-H., and Lin, P.-C. 2009. Application classification using packet size distribution and port association. J. Netw. Comput. Appl. 32, 5, 1023--1030. Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. Liu, H., Feng, W., Huang, Y., and Li, X. 2007. A peer-to-peer traffic identification method using machine learning. In Proceedings of the International Conference on Networking, Architecture, and Storage (NAS'07). IEEE, 155--160.Google ScholarGoogle Scholar
  108. Ma, J., Levchenko, K., Kreibich, C., Savage, S., and Voelker, G. M. 2006. Unexpected means of protocol inference. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC'06). ACM, New York, NY, 313--326. Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Madhukar, A. and Williamson, C. 2006. A longitudinal study of P2P traffic classification. In Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS'06). IEEE Computer Society, Washington, DC, 179--188. Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. Makhoul, J., Kubala, F., Schwartz, R., and Weischedel, R. 1999. Performance measures for information extraction. In Proceedings of the DARPA Broadcast News Workshop. 249--252.Google ScholarGoogle Scholar
  111. Mantia, G. L., Rossi, D., Finamore, A., Mellia, M., and Meo, M. 2010. Stochastic packet inspection for TCP traffic. In Proceedings of the IEEE International Conference on Communications (ICC'10). IEEE, 1--6.Google ScholarGoogle Scholar
  112. MAPI. 2010. MAPI, monitoring API. http://mapi.uninett.no. (Last accessed 3/10).Google ScholarGoogle Scholar
  113. McGregor, A., Hall, M., Lorier, P., and Brunskill, J. 2004. Flow clustering using machine learning techniques. In Proceedings of the Passive and Active Measurement Workshop (PAM'04). Lecture Notes in Computer Science, vol. 3015, Springer-Verlag, Berlin Heidelberg, 205--214.Google ScholarGoogle Scholar
  114. McGregor, T. 2002. Quality in measurement: Beyond the deployment barrier. In Proceedings of the Symposium on Applications and the Internet Workshops (SAINT-W'02). IEEE Computer Society, Washington, DC, 66--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. Moore, A. W. and Papagiannaki, K. 2005. Toward the accurate identification of network applications. In Proceedings of the Passive and Active Measurement Conference (PAM'05). Lecture Notes in Computer Science, vol. 3431. Springer-Verlag, Berlin Heidelberg, 41--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. Moore, A. W. and Zuev, D. 2005. Internet traffic classification using bayesian analysis techniques. ACM SIGMETRICS Perform. Eval. Rev. 33, 1, 50--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. Moore, A. W., Zuev, D., and Crogan, M. L. 2005. Discriminators for use in flow-based classification. Tech. rep. RR-05-13, Intel Research, Cambridge, U.K. Aug.Google ScholarGoogle Scholar
  118. Moore, D., Keys, K., Koga, R., Lagache, E., and Claffy, K. C. 2001. The CoralReef software suite as a tool for system and network administrators. In Proceedings of the 15th USENIX System Administration Conference (LISA'01). USENIX Association, Berkeley, CA, 133--144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. Mu, J., Sezer, S., Douglas, G., Burns, D., Garcia, E., Hutton, M., and Cackovic, K. 2007. Accelerating pattern matching for DPI. In Proceedings of the IEEE International Symposium on System-on-Chip (SOC'07). IEEE, 83--86.Google ScholarGoogle Scholar
  120. Murray, M. and Claffy, K. C. 2001. Measuring the immeasurable: Global Internet measurement infrastructure. In Proceedings of the Passive and Active Measurement Workshop (PAM'01). 159--167.Google ScholarGoogle Scholar
  121. Napatech. 2011. Intelligent real-time network analysis. http://www.napatech.com. (Last accessed 7/11).Google ScholarGoogle Scholar
  122. NetADHICT. 2010. http://www.ccsl.carleton.ca/software/netadhict/. (Last accessed 3/10).Google ScholarGoogle Scholar
  123. NetBee. 2010. The NetBee library. http://www.nbee.org. (Last accessed 3/10).Google ScholarGoogle Scholar
  124. NetPDL. 2010. http://www.nbee.org/netpdl. (Last accessed 3/10).Google ScholarGoogle Scholar
  125. Nguyen, T. T. T. and Armitage, G. 2006. Training on multiple sub-flows to optimise the use of machine learning classifiers in real-world IP networks. In Proceedings of the IEEE Conference on Local Computer Networks (LCN'06). IEEE, 369--376.Google ScholarGoogle Scholar
  126. Nguyen, T. T. T. and Armitage, G. 2008a. Clustering to assist supervised machine learning for real-time IP traffic classification. In Proceedings of the IEEE International Conference on Communications (ICC'08). IEEE, 5857--5862.Google ScholarGoogle Scholar
  127. Nguyen, T. T. T. and Armitage, G. 2008b. A survey of techniques for Internet traffic classification using machine learning. IEEE Commun. Surveys Tuts. 10, 4, 56--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. NLANR. 2010. NLANR/MNA home page. http://www.nlanr.net. (Last accessed 3/10).Google ScholarGoogle Scholar
  129. Nogueira, A., Salvador, P., Couto, A., and Valadas, R. 2009. Towards the on-line identification of peer-to-peer flow patterns. J. Netw. 4, 2, 108--118.Google ScholarGoogle Scholar
  130. Nogueira, A., Salvador, P., and Valadas, R. 2007. A framework for detecting internet applications. In Proceedings of the International Conference on Information Networking (ICOIN'07). Springer-Verlag, Berlin Heidelberg, 455--464. Google ScholarGoogle ScholarDigital LibraryDigital Library
  131. Ohm, P., Sicker, D. C., and Grunwald, D. 2007. Legal issues surrounding monitoring during network research. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC'07). ACM, New York, NY, 141--148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. Ohzahata, S., Hagiwara, Y., Terada, M., and Kawashima, K. 2005. A traffic identification method and evaluations for a pure P2P application. In Proceedings of the Passive and Active Measurement Conference (PAM'05). Lecture Notes in Computer Science, vol. 3431, Springer-Verlag, Berlin Heidelberg, 55--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  133. Olson, D. L. and Delen, D. 2008. Advanced Data Mining Techniques 1st Ed. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  134. OpenDPI. 2010. OpenDPI - the open source deep packet inspection engine. http://www.opendpi.org. (Last accessed 3/10).Google ScholarGoogle Scholar
  135. Palmieri, F. and Fiore, U. 2009. A nonlinear, recurrence-based approach to traffic classification. Comput. Netw. 53, 6, 761--773. Google ScholarGoogle ScholarDigital LibraryDigital Library
  136. Park, B.-C., Won, Y. J., Kim, M.-S., and Hong, J. W. 2008. Towards automated application signature generation for traffic identification. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS'08). IEEE, 160--167.Google ScholarGoogle Scholar
  137. Paxson, V. 2004. Strategies for sound Internet measurement. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC'04). ACM, New York, NY, 263--271. Google ScholarGoogle ScholarDigital LibraryDigital Library
  138. Perényi, M., Dang, T. D., Gefferth, A., and Molnár, S. 2006. Identification and analysis of peer-to-peer traffic. J. Commun. 1, 7, 36--46.Google ScholarGoogle ScholarCross RefCross Ref
  139. Plonka, D. 2000. FlowScan: A network traffic flow reporting and visualization tool. In Proceedings of the 14th USENIX System Administration Conference (LISA'00). USENIX Association, Berkeley, CA, 305--317. Google ScholarGoogle ScholarDigital LibraryDigital Library
  140. Raahemi, B., Kouznetsov, A., Hayajneh, A., and Rabinovitch, P. 2008a. Classification of peer-to-peer traffic using incremental neural networks (fuzzy ARTMAP). In Proceedings of the Canadian Conference on Electrical and Computer Engineering (CCECE'08). IEEE, 719--724.Google ScholarGoogle Scholar
  141. Raahemi, B., Zhong, W., and Liu, J. 2008b. Peer-to-peer traffic identification by mining IP layer data streams using concept-adapting very fast decision tree. In Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'08), Vol. 1. IEEE, 525--532. Google ScholarGoogle ScholarDigital LibraryDigital Library
  142. Ranjan, S., Shah, S., Nucci, A., Munafò, M., Cruz, R., and Muthukrishnan, S. 2007. DoWitcher: Effective worm detection and containment in the internet core. In Proceedings of the 26th IEEE International Conference on Computer Communications (InfoCom'07). IEEE, 2541--2545.Google ScholarGoogle Scholar
  143. Risso, F. and Baldi, M. 2006. NetPDL: An extensible XML-based language for packet header description. Comput. Netw. 50, 5, 688--706. Google ScholarGoogle ScholarDigital LibraryDigital Library
  144. Risso, F., Baldi, M., Morandi, O., Baldini, A., and Monclus, P. 2008. Lightweight, payload-based traffic classification: An experimental evaluation. In Proceedings of the IEEE International Conference on Communications (ICC'08). IEEE, 5869--5875.Google ScholarGoogle Scholar
  145. Romig, S., Fullmer, M., and Luman, R. 2000. The OSU flow-tools package and CISCO NetFlow logs. In Proceedings of the 14th USENIX System Administration Conference (LISA'00). USENIX Association, Berkeley, CA, 291--303. Google ScholarGoogle ScholarDigital LibraryDigital Library
  146. Salgarelli, L., Gringoli, F., and Karagiannis, T. 2007. Comparing traffic classifiers. ACM SIGCOMM Comput. Commun. Rev. 37, 3, 65--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  147. Saroiu, S., Gummadi, K. P., Dunn, R. J., Gribble, S. D., and Levy, H. M. 2002a. An analysis of Internet content delivery systems. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI'02), Vol. 36. ACM, New York, NY, 315--327. Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. Saroiu, S., Gummadi, P. K., and Gribble, S. D. 2002b. A measurement study of peer-to-peer file sharing systems. In Proceedings of the Multimedia Computing and Networking (MMCN'02). ACM, New York, NY.Google ScholarGoogle Scholar
  149. Saroiu, S., Gummadi, P. K., and Gribble, S. D. 2003. Measuring and analyzing the characteristics of Napster and Gnutella hosts. Multimedia Syst. J. 9, 2, 170--184. Google ScholarGoogle ScholarDigital LibraryDigital Library
  150. Schmidt, Ş. E. G. and Soysal, M. 2006. An intrusion detection based approach for the scalable detection of P2P traffic in the national academic backbone network. In Proceedings of the International Symposium on Computer Networks (ISCN'06). IEEE, 128--133.Google ScholarGoogle Scholar
  151. Schulze, H. and Mochalski, K. 2007. Internet study 2007. Tech. rep., ipoque.Google ScholarGoogle Scholar
  152. Schulze, H. and Mochalski, K. 2009. Internet study 2008/2009. Tech. rep., ipoque.Google ScholarGoogle Scholar
  153. Seedorf, J. 2006. Security challenges for peer-to-peer SIP. IEEE Netw. 20, 5, 38--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  154. Sen, S., Spatscheck, O., and Wang, D. 2004. Accurate, scalable in-network identification of P2P traffic using application signatures. In Proceedings of the 13th International Conference on World Wide Web (WWW'04). ACM, New York, NY, 512--521. Google ScholarGoogle ScholarDigital LibraryDigital Library
  155. Sen, S. and Wang, J. 2004. Analyzing peer-to-peer traffic across large networks. IEEE/ACM Trans. Netw. 12, 2, 219--232. Google ScholarGoogle ScholarDigital LibraryDigital Library
  156. Sena, G. G. and Belzarena, P. 2009. Early traffic classification using support vector machines. In Proceedings of the 5th International Latin American Networking Conference (LANC'09). ACM, New York, NY, 60--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. Singh, S., Estan, C., Varghese, G., and Savage, S. 2004. Automated worm fingerprinting. In Proceedings of the 6th Symposium on Operating Systems Design & Implementation (OSDI'04). USENIX Association, Berkeley, CA, USA, 45--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  158. Smith, F. D., Campos, F. H., Jeffay, K., and Ott, D. 2001. What TCP/IP protocol headers can tell us about the Web. ACM SIGMETRICS Perform. Eval. Rev. 29, 1, 245--256. Google ScholarGoogle ScholarDigital LibraryDigital Library
  159. Smith, R., Estan, C., Jha, S., and Kong, S. 2008. Deflating the big bang: Fast and scalable deep packet inspection with extended finite automata. ACM SIGCOMM Comput. Commun. Rev. 38, 4, 207--218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  160. Snort. 2010. http://www.snort.org. (Last accessed 3/10).Google ScholarGoogle Scholar
  161. Soewito, B., Mahajan, A., Weng, N., and Wang, H. 2009. High-speed string matching for network intrusion detection. Int. J. Commun. Netw. Distrib. Syst. 3, 4, 319--339. Google ScholarGoogle ScholarDigital LibraryDigital Library
  162. Soysal, M. and Schmidt, E. G. 2007. An accurate evaluation of machine learning algorithms for flow-based P2P traffic detection. In Proceedings of the 22nd International Symposium on Computer and Information Sciences (ISCIS'07). IEEE.Google ScholarGoogle Scholar
  163. Sperotto, A., Sadre, R., van Vliet, F., and Pras, A. 2009. A labeled data set for flow-based intrusion detection. In Proceedings of the 9th IEEE International Workshop on IP Operations and Management (IPOM'09). Lecture Notes in Computer Science, vol. 5843, Springer-Verlag, Berlin Heidelberg, 39--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  164. Spognardi, A., Lucarelli, A., and Pietro, R. D. 2005. A methodology for P2P file-sharing traffic detection. In Proceedings of the 2nd International Workshop on Hot Topics in Peer-to-Peer Systems (HOT-P2P'05). IEEE Computer Society, Washington, DC, 52--61. Google ScholarGoogle ScholarDigital LibraryDigital Library
  165. Stefanowski, J. and Wilk, S. 2009. Extending rule-based classifiers to improve recognition of imbalanced classes. In Advances in Data Management, Z. W. Ras and A. Dardzinska, Eds., Studies in Computational Intelligence, vol. 223, Springer-Verlag, Berlin Heidelberg, 131--154.Google ScholarGoogle Scholar
  166. Strayer, T., Armitage, G., Allman, M., Moore, A. W., Jin, S., and Bellovin, S. 2008. IMRG workshop on application classification and identification report. ACM SIGCOMM Comput. Commun. Rev. 38, 3, 87--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  167. Szabó, G., Orincsay, D., Malomsoky, S., and Szabó, I. 2008. On the validation of traffic classification algorithms. In Proceedings of the Passive and Active Measurement Conference (PAM'08). Lecture Notes in Computer Science, vol. 4979, Springer-Verlag, Berlin Heidelberg, 72--81. Google ScholarGoogle ScholarDigital LibraryDigital Library
  168. Szabó, G., Szabó, I., and Orincsay, D. 2007. Accurate traffic classification. In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'07). IEEE, 1--8.Google ScholarGoogle Scholar
  169. tcpdump. 2011. TCPDUMP/LIBPCAP public repository. http://www.tcpdump.org. (Last accessed 7/10).Google ScholarGoogle Scholar
  170. TIE. 2010. TIE, traffic identification engine. http://tie.comics.unina.it. (Last accessed 7/10).Google ScholarGoogle Scholar
  171. Turkett, W. H., Karode, A. V., and Fulp, E. W. 2008. In-the-dark network traffic classification using support vector machines. In Proceedings of the 20th National Conference on Innovative Applications of Artificial Intelligence (IAAI'08). AAAI Press, 1745--1750. Google ScholarGoogle ScholarDigital LibraryDigital Library
  172. Valenti, S., Rossi, D., Meo, M., Mellia, M., and Bermolen, P. 2009. Accurate, fine-grained classification of P2P-TV applications by simply counting packets. In Proceedings of the 1st International Workshop on Traffic Monitoring and Analysis (TMA'09), Lecture Notes in Computer Science, vol. 5537, Springer-Verlag, Berlin, Heidelberg, 84--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  173. Wang, Y. 2008. Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection. Premier Reference Source. Information Science Reference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  174. Wang, Y.-H., Gau, V., Bosaw, T., Hwang, J.-N., Lippman, A., Liebennan, D., and Wu, I.-C. 2008. Generalization performance analysis of flow-based peer-to-peer traffic identification. In Proceedings of the IEEE Workshop on Machine Learning for Signal Processing (MLSP'08). IEEE, 267--272.Google ScholarGoogle Scholar
  175. Weiss, G. M. 2004. Mining with rarity: A unifying framework. ACM SIGKDD Explor. Newsl. 6, 1, 7--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  176. WildPackets. 2011. WildPackets: Network analyzer, voip monitoring, protocol analysis. http://www.wildpackets.com. (Last accessed 7/11).Google ScholarGoogle Scholar
  177. Williams, N., Zander, S., and Armitage, G. 2006. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. ACM SIGCOMM Comput. Commun. Rev. 36, 5, 5--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  178. Williamson, C. 2001. Internet traffic measurement. IEEE Internet Comput. 5, 6, 70--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  179. WinDump. 2011. tcpdump for Windows using WinPcap. http://www.winpcap.org/windump/. (Last accessed 7/11).Google ScholarGoogle Scholar
  180. WinPcap. 2011. The industry-standard windows packet capture library. http://www.winpcap.org. (Last accessed 7/11).Google ScholarGoogle Scholar
  181. Wireshark. 2010. Wireshark, go deep. http://www.wireshark.org. (Last accessed 3/10).Google ScholarGoogle Scholar
  182. Wright, C. V., Monrose, F., and Masson, G. M. 2006. On inferring application protocol behaviors in encrypted network traffic. J. Mach. Learn. Res. 7, 2745--2769. Google ScholarGoogle ScholarDigital LibraryDigital Library
  183. Xu, K., Liu, J., and Wang, H. 2008. Tod-cache: Peer-to-peer traffic management and optimization using combined caching and redirection. In Proceedings of the IEEE Global Telecommunications Conference (GlobeCom'08). IEEE, 1--5.Google ScholarGoogle Scholar
  184. Xusheng, Z. and Zhiming, W. 2009. Application of markov chain in IP traffic classification. In Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC'09), Vol. 2. IEEE Computer Society, 688--691. Google ScholarGoogle ScholarDigital LibraryDigital Library
  185. Yegneswaran, V., Giffin, J. T., Barford, P., and Jha, S. 2005. An architecture for generating semantics-aware signatures. In Proceedings of the 14th USENIX Security Symposium (SSYM'05). USENIX Association, Berkeley, CA, 97--112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  186. Yu, F. 2006. High speed deep packet inspection with hardware support. Ph.D. dissertation, EECS Department, University of California, Berkeley, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  187. Zander, S., Nguyen, T., and Armitage, G. 2005a. Automated traffic classification and application identification using machine learning. In Proceedings of the IEEE Conference on Local Computer Networks (LCN'2005). IEEE, 250--257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  188. Zander, S., Nguyen, T., and Armitage, G. 2005b. Self-learning IP traffic classification based on statistical flow characteristics. In Proceedings of the Passive and Active Measurement Conference (PAM'05). Lecture Notes in Computer Science, vol. 3431. Springer-Verlag, Berlin Heidelberg, 325--328. Google ScholarGoogle ScholarDigital LibraryDigital Library
  189. Zhou, L., Zhang, L., McSherry, F., Immorlica, N., Costa, M., and Chien, S. 2005. A first look at peer-to-peer worms: Threats and defenses. In Proceedings of the 4th International Workshop on Peer-to-Peer Systems (IPTPS'05). Lecture Notes in Computer Science, vol. 3640, Springer, Berlin Heidelberg, 24--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  190. Zuev, D. and Moore, A. W. 2005. Traffic classification using a statistical approach. In Proceedings of the Passive and Active Measurement Conference (PAM'05). Lecture Notes in Computer Science, vol. 3431, Springer-Verlag, Berlin Heidelberg, 321--324. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Detection and classification of peer-to-peer traffic: A survey

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                • Published in

                  cover image ACM Computing Surveys
                  ACM Computing Surveys  Volume 45, Issue 3
                  June 2013
                  575 pages
                  ISSN:0360-0300
                  EISSN:1557-7341
                  DOI:10.1145/2480741
                  Issue’s Table of Contents

                  Copyright © 2013 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 3 July 2013
                  • Accepted: 1 January 2012
                  • Revised: 1 August 2011
                  • Received: 1 May 2010
                  Published in csur Volume 45, Issue 3

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article
                  • Research
                  • Refereed

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader