skip to main content
10.1145/2739482.2768432acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
research-article

A Preliminary Investigation on the Identification of Peer to Peer Network Applications

Published:11 July 2015Publication History

ABSTRACT

Identification of P2P (peer to peer) applications inside network traffic plays an important role for route provisioning, traffic policing, flow prioritization, network service pricing, network capacity planning and network resource management. Inspecting and identifying the P2P applications is one of the most important tasks to have a network that runs efficiently. In this paper, we focus on identification of different P2P applications. To this end, we explore four commonly used supervised machine learning algorithms as C4.5, Ripper, SVM(Support Vector Machines), Naïve Bayesian and well known unsupervised machine learning algorithm K-Means on four different datasets. We evaluate their performances to identify the P2P applications that each traffic flow belongs to. Evaluations show that, Ripper algorithm gives better results than the others.

References

  1. Alpaydin, E. 2004. Introduction to Machine Learning, MIT Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Burges, C. J. C. 1998. A Tutorial on Support Vector Machines for Pattern Recognition, Data Mining and Knowledge Discovery, Volume 2, pp. 1--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. George, H. and Langley, P. 1995. Estimating Continuous Distributions in Bayesian Classifiers, Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence. pp. 338--345, Morgan Kaufmann, San Mateo. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Hyunchul, K., Claffy, K. C., Fomenkov, M., Barman, D., Faloutsos , M., and Lee, K. 2008. Internet traffic classification demystified: myths, caveats, and the best practices, Proceedings of the 2008 ACM CoNEXT Conference, p.1--12, Madrid, Spain. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Liu, F., Li, Z., and Nie, Q., 2009. A New Method of P2P Traffic Identification Based on Support Vector Machine at the Host Level, International Conference on Information Technology and Computer Science, ITCS 2009, Volume 2, pp. 579--582, Kiev, Ukraine. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Alshammari, R., and Zincir-Heywood, A.N., 2009. Machine learning based encrypted traffic classification: Identifying SSH and Skype, IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, pp.1--8, Ottawa, Canada. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Wang, J., Zhang, J., and Tan, Y, 2011. Research of P2P traffic identification based on traffic characteristics, International Conference on Multimedia Technology, ICMT 2011, pp.5032--5035, Hangzhou, China.Google ScholarGoogle Scholar
  8. Liu, T., and Chen, X., 2011. A novel approach to detect P2P traffic based on program behavior analysis, International Conference on Electrical and Control Engineering, ICECE 2011, pp.5677--5680, Yichang, China.Google ScholarGoogle Scholar
  9. Soysal, M., and Schmidt, E.G., 2007. An accurate evaluation of machine learning algorithms for flow-based P2P traffic detection, 22nd International Symposium on Computer and Information Sciences, ISCIS 2007, pp.1--6, Ankara, Turkey.Google ScholarGoogle Scholar
  10. Kun, L., Wei, G., 2010. Feedback model based on P2P traffic control, International Conference on Computational Problem Solving, ICCP 201, pp.35--38, Lijiang, China.Google ScholarGoogle Scholar
  11. Guanghui, H., Hou, J., Chen, W. P., Hamada, T., 2007, One Size Does Not Fit All: A Detailed Analysis and Modeling of P2P Traffic, Global Telecommunications Conference, IEEE GLOBECOM 2007, pp.393--398, Washington, US.Google ScholarGoogle Scholar
  12. Chunzhi, W., Wei., J., Hong, C., Luo, W., Fang, H., 2010. Research on a method of P2P traffic identification based on multi-dimension characteristics, 5th International Conference on Computer Science and Education, ICCSE 2010, pp.1010--1013, Hefei, China.Google ScholarGoogle ScholarCross RefCross Ref
  13. BitCommet P2P file sharing software, http://www.bitcomet.com/Google ScholarGoogle Scholar
  14. BitTorrent P2P file sharing software, http://www.bittorrent.com/Google ScholarGoogle Scholar
  15. UTorrent P2P file sharing software, http://www.utorrent.com/Google ScholarGoogle Scholar
  16. Netmate network measurement tool, http://www.ip-measurement.org/tools/netmateGoogle ScholarGoogle Scholar
  17. Alshammari, R., Zincir-Heywood, A. N., 2010. An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype, International Conference on Network and Service Management, CNSM 2010,pp.310--313, Niagara Falls, Canada.Google ScholarGoogle ScholarCross RefCross Ref
  18. Calculating Flow Statistics using NetMate: http://dan.arndt.ca/nims/calculating-flow-statistics-using-netmate/Google ScholarGoogle Scholar
  19. Quinlan, J.R., 1993. C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers, ISBN:1--55860--238-0. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Weka software http://www.cs.waikato.ac.nz/ml/wekaGoogle ScholarGoogle Scholar

Index Terms

  1. A Preliminary Investigation on the Identification of Peer to Peer Network Applications

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            GECCO Companion '15: Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation
            July 2015
            1568 pages
            ISBN:9781450334884
            DOI:10.1145/2739482

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 11 July 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate1,669of4,410submissions,38%

            Upcoming Conference

            GECCO '24
            Genetic and Evolutionary Computation Conference
            July 14 - 18, 2024
            Melbourne , VIC , Australia

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader