Cart (Loading....) | Create Account
Close category search window

A novel approach to detect P2P traffic based on program behavior analysis

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Tiexing Liu ; State Key Lab. of Networking & Switching, Beijing Univ. of Posts & Telecommun., Beijing, China ; Xingyu Chen

In the past few years, peer-to-peer (P2P) applications have generated the main part of the Internet traffic. Large amounts of network bandwidth have been consumed by various P2P applications, which decreases the quality of network services. Therefore, the ISPs and campus network administrators are eager to be able to manage the P2P traffic. However, the main problem of P2P traffic management is the difficulty in detecting P2P traffic. As P2P applications use all sorts of techniques to conceal their traffic, it is difficult for the ISPs to distinguish P2P traffic from traditional application traffic, which makes the P2P traffic unmanageable. This paper puts forward a traffic identification methodology named Peerldentifier which is based on program behavior analysis. The Peerldentifier is able to separate the traffic of P2P file sharing applications from traditional application traffic and identify the hosts which participate in P2P activities and the listening ports of the P2P clients running on these hosts. The experimental results indicate that Peerldentifier is able to detect the overwhelming majority of P2P traffic effectively with a tiny probability of false positive or false negative.

Published in:

Electrical and Control Engineering (ICECE), 2011 International Conference on

Date of Conference:

16-18 Sept. 2011

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.