Active learning for P2P traffic identification

被引:5
|
作者
Liu, San-Min [1 ,2 ]
Sun, Zhi-Xin [1 ,3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Jiangsu, Peoples R China
[2] Anhui Polytech Univ, Coll Comp & Informat, Wuhu 241000, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Key Lab Broadband Wireless Commun & Sensor Networ, Minist Educ, Nanjing 210003, Jiangsu, Peoples R China
基金
美国国家科学基金会;
关键词
Active learning; Support vector data description; Traffic identification; P2P; CLASSIFICATION;
D O I
10.1007/s12083-014-0281-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
P2P traffic identification methods by using machine learning have been provided in a great number of works, which suffer from a large and representative labeled sample set. To overcome the sample labeling problem, a new P2P traffic identification approach by active learning called P2PTIAL is presented. P2PTIAL is composed of two parts: support vector machine as learner and uncertainty selection based on distance. In order to improve the effectiveness of P2PTIAL, we add filtering policy and balanced policy to P2PTIAL. Firstly, we use support vector data description (SVDD) theory to filter some unlabeled samples, which have little contribution on active learning, and so it can save computation cost and storage space. Secondly, we use the unlabeled sample's pre-labeled information to develop balanced policy, which can keep balanced learning. Lastly, we support our design with extensive simulation experiments, and our results show P2PTIAL is feasible.
引用
收藏
页码:733 / 740
页数:8
相关论文
共 50 条
  • [31] A Design and Implementation of P2P Network Traffic Identification System
    Ma, Xiaoyu
    Chen, Feiyan
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 5193 - +
  • [32] P2P Traffic Identification Based on the Signatures of Key Packets
    Wang, Pinghui
    Guan, Xiaohong
    Qin, Tao
    CAMAD: 2009 IEEE 14TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS, 2009, : 42 - 46
  • [33] Identification and analysis of P2P traffic- An example of BitTorrent
    Horng, Mong-Fong
    Chen, Chun-Wei
    Chuang, Chin-Shun
    Lin, Cheng-Yu
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 2, PROCEEDINGS, 2006, : 266 - +
  • [34] IDENTIFICATION OF P2P STREAMING TRAFFIC BASED ON INTEGRATED CHARACTERISTICS
    Wu, Guiqin
    Yang, Jie
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 197 - 201
  • [35] A traffic identification method and evaluations for a pure P2P application
    Ohzahata, S
    Hagiwara, Y
    Terada, M
    Kawashima, K
    PASSIVE AND ACTIVE NETWORK MEASUREMENT, PROCEEDINGS, 2005, 3431 : 55 - 68
  • [36] Design of P2P Traffic Identification Based on DPI and DFI
    Wang, Chunzhi
    Zhou, Xin
    You, Fangping
    Chen, Hongwei
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 978 - 981
  • [37] P2P traffic optimization
    Zhang GuoQiang
    Tang MingDong
    Cheng SuQi
    Zhang GuoQing
    Song HaiBin
    Cao JiGuang
    Yang Jing
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (07) : 1475 - 1492
  • [38] P2P traffic optimization
    ZHANG GuoQiang 1
    2 Institute of Computing Technology
    3 School of Computer Science and Engineering
    4 Graduate University of Chinese Academy of Sciences
    5 Nanjing R&D Center
    6 China Academy of Telecommunication Research of MIIT
    7 China Mobile Research Institute
    ScienceChina(InformationSciences), 2012, 55 (07) : 1475 - 1492
  • [39] P2P traffic optimization
    GuoQiang Zhang
    MingDong Tang
    SuQi Cheng
    GuoQing Zhang
    HaiBin Song
    JiGuang Cao
    Jing Yang
    Science China Information Sciences, 2012, 55 : 1475 - 1492
  • [40] P2P and P2P botnet traffic classification in two stages
    Ye, Wujian
    Cho, Kyungsan
    SOFT COMPUTING, 2017, 21 (05) : 1315 - 1326