Skip to Main Content
In the last few years, we have seen that the attack and P2P traffic has increased significantly. Currently, P2P traffic represents a significant portion of Internet traffic and the attacks represent a serious threat to computer systems. The approach presented here uses a small number of statistical discriminators and cluster analysis to identify such kind of traffics, obtaining results that are better than the results found into previous papers. We perform an empirical test using real traces.