What Is the Impact of P2P Traffic on Anomaly Detection?

被引:0
|
作者
Ul Haq, Irfan [1 ]
Ali, Sardar [1 ]
Khan, Hassan [1 ]
Khayam, Syed Ali [1 ]
机构
[1] NUST, Sch Elect Engn & Comp Sci, Islamabad 44000, Pakistan
来源
关键词
NETWORK;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent studies estimate that peer-to-peer (p2p) traffic comprises 40-70% of today's Internet traffic [1]. Surprisingly, the impact of p2p traffic on anomaly detection has not been investigated. In this paper, we collect and use a labeled dataset containing diverse network anomalies (portscans, TOP floods, UDP floods, at varying rates) and p2p traffic (encrypted and unencrypted with BitTorrent, Vuze, Flashget, mu Torrent, Deluge, BitComet, Halite, eDonkey and Kademlia clients) to empirically quantify the impact of p2p traffic on anomaly detection. Four prominent anomaly detectors (TRW-CB [7], Rate Limiting [8], Maximum Entropy [10] and NETAD [11]) are evaluated on this dataset. Our results reveal that: 1) p2p traffic results in up to 30% decrease in detection rate and up to 45% increase in false positive rate; 2) due to a partial overlap of traffic behaviors, p2p traffic inadvertently provides an effective evasion cover for high- and low-rate attacks; and 3) training an anomaly detector on p2p traffic, instead of improving accuracy, introduces a significant accuracy degradation for the anomaly detector. Based on these results, we argue that only p2p traffic filtering can provide a pragmatic, yet short-term, solution to this problem. We incorporate two prominent p2p traffic classifiers (OpenDPI [23] and Karagiannis' Payload Classifier(KPC) [24]) as pre-processors into the anomaly detectors and show that the existing non-proprietary p2p traffic classifiers do not have sufficient accuracies to mitigate the negative impacts of p2p traffic on anomaly detection. Given the premise that p2p traffic is here to stay, our work demonstrates the need to rethink the classical anomaly detection design philosophy with a focus on performing anomaly detection in the presence of p2p traffic. We make our dataset publicly available for evaluation of future anomaly detectors that are designed to operate with p2p traffic.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 50 条
  • [21] On the resilience of P2P botnet footprints in the presence of legitimate P2P traffic
    Daneshgar, Fateme Faraji
    Abbaspour, Maghsoud
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (13)
  • [22] P2P Traffic Detection Based on Particle Swarm Optimization Algorithm
    Song Rong
    Li Xiating
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (12): : 155 - 164
  • [23] Survey on P2P Traffic Managements
    Luo, Yingru
    [J]. PROCEEDINGS OF THE 2011 2ND INTERNATIONAL CONGRESS ON COMPUTER APPLICATIONS AND COMPUTATIONAL SCIENCE, VOL 2, 2012, 145 : 191 - 196
  • [24] Profiling and identification of P2P traffic
    Hu, Yan
    Chiu, Dah-Ming
    Lui, John C. S.
    [J]. COMPUTER NETWORKS, 2009, 53 (06) : 849 - 863
  • [25] Identifying P2P traffic: A survey
    Max Bhatia
    Mritunjay Kumar Rai
    [J]. Peer-to-Peer Networking and Applications, 2017, 10 : 1182 - 1203
  • [26] P2P worm detection based on traffic classification and application identification
    Key Laboratory of Beijing Network Technology, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    [J]. Beijing Hangkong Hangtian Daxue Xuebao, 2006, 8 (998-1002):
  • [27] Identifying P2P traffic: A survey
    Bhatia, Max
    Rai, Mritunjay Kumar
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (05) : 1182 - 1203
  • [28] The Internet-Wide Impact of P2P Traffic Localization on ISP Profitability
    Seibert, Jeff
    Torres, Ruben
    Mellia, Marco
    Munafo, Maurizio M.
    Nita-Rotaru, Cristina
    Rao, Sanjay
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (06) : 1910 - 1923
  • [29] On the Use of Traffic Information to Improve the Coordinated P2P Detection of SLA Violations
    Nobre, Jeferson C.
    Granville, Lisandro Z.
    Clemm, Alexander
    Prieto, Alberto Gonzalez
    [J]. 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 613 - 620
  • [30] Detection and Management of P2P Traffic in Networks using Artificial Neural Networksa
    Mills, Godfrey A.
    Pomary, Pamela
    Togo, Emmanuel
    Sowah, Robert A.
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2022, 30 (02)