Peer-to-Peer Application Recognition Based on Signaling Activity
- 1 June 2009
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Because of the enormous growth in the number of peer-to-peer (P2P) applications, P2P traffic now constitutes a substantial proportion of Internet traffic. The ability to accurately identify different P2P applications from the network traffic is essential for managing a number of network traffic issues, such as service differentiation and capacity planning. However, modern P2P applications often use proprietary protocols, dynamic port numbers, and packet encryptions, which make traditional identification approaches like port-based or signature- based identification less effective. In this paper, we propose an approach for accurately recognizing P2P applications running on monitored hosts based on signaling behavior, which is regulated by the underlying P2P protocol; therefore, each application possesses a distinguishing characteristic. We consider that the signaling behavior of each P2P application can serve as a unique signature for application identification. Our approach is particularly useful for three reasons: 1) it does not need to access the packet payload; 2) it recognizes applications based purely on their signaling behavior; and 3) it can identify particular P2P applications. The performance evaluation shows that 92% of a real-life traffic trace can be correctly recognized within a 5-minute monitoring period.Keywords
This publication has 8 references indexed in Scilit:
- Tracking Down Skype TrafficPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Identification of P2P traffic based on the content redistribution characteristicPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Identification and Analysis of Peer-to-Peer TrafficJournal of Communications, 2006
- Identifying Known and Unknown Peer-to-Peer TrafficPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- BLINCACM SIGCOMM Computer Communication Review, 2005
- Transport layer identification of P2P trafficPublished by Association for Computing Machinery (ACM) ,2004
- Accurate, scalable in-network identification of p2p traffic using application signaturesPublished by Association for Computing Machinery (ACM) ,2004
- Analyzing Peer-To-Peer Traffic Across Large NetworksIEEE/ACM Transactions on Networking, 2004