What Is the Impact of P2P Traffic on Anomaly Detection?

被引:0
|
作者
Ul Haq, Irfan [1 ]
Ali, Sardar [1 ]
Khan, Hassan [1 ]
Khayam, Syed Ali [1 ]
机构
[1] NUST, Sch Elect Engn & Comp Sci, Islamabad 44000, Pakistan
来源
关键词
NETWORK;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent studies estimate that peer-to-peer (p2p) traffic comprises 40-70% of today's Internet traffic [1]. Surprisingly, the impact of p2p traffic on anomaly detection has not been investigated. In this paper, we collect and use a labeled dataset containing diverse network anomalies (portscans, TOP floods, UDP floods, at varying rates) and p2p traffic (encrypted and unencrypted with BitTorrent, Vuze, Flashget, mu Torrent, Deluge, BitComet, Halite, eDonkey and Kademlia clients) to empirically quantify the impact of p2p traffic on anomaly detection. Four prominent anomaly detectors (TRW-CB [7], Rate Limiting [8], Maximum Entropy [10] and NETAD [11]) are evaluated on this dataset. Our results reveal that: 1) p2p traffic results in up to 30% decrease in detection rate and up to 45% increase in false positive rate; 2) due to a partial overlap of traffic behaviors, p2p traffic inadvertently provides an effective evasion cover for high- and low-rate attacks; and 3) training an anomaly detector on p2p traffic, instead of improving accuracy, introduces a significant accuracy degradation for the anomaly detector. Based on these results, we argue that only p2p traffic filtering can provide a pragmatic, yet short-term, solution to this problem. We incorporate two prominent p2p traffic classifiers (OpenDPI [23] and Karagiannis' Payload Classifier(KPC) [24]) as pre-processors into the anomaly detectors and show that the existing non-proprietary p2p traffic classifiers do not have sufficient accuracies to mitigate the negative impacts of p2p traffic on anomaly detection. Given the premise that p2p traffic is here to stay, our work demonstrates the need to rethink the classical anomaly detection design philosophy with a focus on performing anomaly detection in the presence of p2p traffic. We make our dataset publicly available for evaluation of future anomaly detectors that are designed to operate with p2p traffic.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 50 条
  • [1] Traffic Anomaly Detection in the Presence of P2P Traffic
    Ali, Sardar
    Wu, Kui
    Khan, Hassan
    [J]. 2014 IEEE 39TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2014, : 482 - 485
  • [2] Collaborative Anomaly Detection For Structured P2P Networks
    Wang, Wei
    Man, Hong
    He, Fangming
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 3116 - 3121
  • [3] Netflow Based P2P Detection in UDP Traffic
    Zhang, Qianli
    Ma, Yunlong
    Zhang, Pei
    Wang, Jilong
    Li, Xing
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND INFORMATION PROCESSING (ICICIP), 2014, : 250 - 254
  • [4] P2P Streaming Traffic Detection in Encrypted Tunnel
    Tseng, Chuan-Mu
    Chao, Ling-Yao
    Liu, Tzong-Jye
    [J]. 2013 FIRST INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2013, : 208 - 212
  • [5] Adaptive traffic sampling for P2P botnet detection
    He, Jie
    Yang, Yuexiang
    Wang, Xiaolei
    Tan, Zhiguo
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2017, 27 (05)
  • [6] P2P traffic optimization
    Zhang GuoQiang
    Tang MingDong
    Cheng SuQi
    Zhang GuoQing
    Song HaiBin
    Cao JiGuang
    Yang Jing
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (07) : 1475 - 1492
  • [7] P2P traffic optimization
    GuoQiang Zhang
    MingDong Tang
    SuQi Cheng
    GuoQing Zhang
    HaiBin Song
    JiGuang Cao
    Jing Yang
    [J]. Science China Information Sciences, 2012, 55 : 1475 - 1492
  • [8] P2P traffic optimization
    ZHANG GuoQiang 1
    2 Institute of Computing Technology
    3 School of Computer Science and Engineering
    4 Graduate University of Chinese Academy of Sciences
    5 Nanjing R&D Center
    6 China Academy of Telecommunication Research of MIIT
    7 China Mobile Research Institute
    [J]. Science China(Information Sciences), 2012, 55 (07) : 1475 - 1492
  • [9] Analysis of P2P, IRC and HTTP traffic for botnets detection
    AsSadhan, Basil
    Bashaiwth, Abdulmuneem
    Al-Muhtadi, Jalal
    Alshebeili, Saleh
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 848 - 861
  • [10] Estimating and Controlling the Traffic Impact of a Collaborative P2P System
    Sousa, Pedro
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, PART VI - ICCSA 2014, 2014, 8584 : 61 - 75