Active learning for P2P traffic identification

被引:5
|
作者
Liu, San-Min [1 ,2 ]
Sun, Zhi-Xin [1 ,3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Jiangsu, Peoples R China
[2] Anhui Polytech Univ, Coll Comp & Informat, Wuhu 241000, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Key Lab Broadband Wireless Commun & Sensor Networ, Minist Educ, Nanjing 210003, Jiangsu, Peoples R China
基金
美国国家科学基金会;
关键词
Active learning; Support vector data description; Traffic identification; P2P; CLASSIFICATION;
D O I
10.1007/s12083-014-0281-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
P2P traffic identification methods by using machine learning have been provided in a great number of works, which suffer from a large and representative labeled sample set. To overcome the sample labeling problem, a new P2P traffic identification approach by active learning called P2PTIAL is presented. P2PTIAL is composed of two parts: support vector machine as learner and uncertainty selection based on distance. In order to improve the effectiveness of P2PTIAL, we add filtering policy and balanced policy to P2PTIAL. Firstly, we use support vector data description (SVDD) theory to filter some unlabeled samples, which have little contribution on active learning, and so it can save computation cost and storage space. Secondly, we use the unlabeled sample's pre-labeled information to develop balanced policy, which can keep balanced learning. Lastly, we support our design with extensive simulation experiments, and our results show P2PTIAL is feasible.
引用
收藏
页码:733 / 740
页数:8
相关论文
共 50 条
  • [41] Collabrium: Active Traffic Pattern Prediction for Boosting P2P Collaboration
    Horovitz, Shay
    Dolev, Danny
    [J]. 2009 18TH IEEE INTERNATIONAL WORKSHOP ON ENABLING TECHNOLOGIES: INFRASTRUCTURES FOR COLLABORATIVE ENTERPRISES, 2009, : 116 - 121
  • [42] P2P Traffic Identification Based on Host and Flow Behaviour Characteristics
    Yan, Jinghua
    Wu, Zhigang
    Luo, Hao
    Zhang, Shuzhuang
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2013, 13 (03) : 64 - 76
  • [43] A New Method and FPGA Implementation of P2P Traffic Identification for EPON
    Cao, Yingying
    Tu, Bing
    Wang, Liqian
    Chen, Xue
    He, Ke
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [44] Accurate P2P traffic identification based on data transfer behavior
    杜敏
    陈兴蜀
    谭骏
    [J]. Journal of Harbin Institute of Technology(New series), 2012, (04) : 43 - 48
  • [45] P2P Traffic Identification Based on Fixed-Length Packets
    Zhang, Ruhui
    Du, Ye
    Liu, Jun
    Wang, Xing
    Yuan, Zhonglan
    [J]. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 761 - 765
  • [46] Research of P2P traffic identification based on BP neural network
    Shen Fuke
    Change Pan
    Ren Xiaoli
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 75 - +
  • [47] Hybrid P2P traffic classification with heuristic rules and machine learning
    Wujian Ye
    Kyungsan Cho
    [J]. Soft Computing, 2014, 18 : 1815 - 1827
  • [48] Hybrid P2P traffic classification with heuristic rules and machine learning
    Ye, Wujian
    Cho, Kyungsan
    [J]. SOFT COMPUTING, 2014, 18 (09) : 1815 - 1827
  • [49] On the resilience of P2P botnet footprints in the presence of legitimate P2P traffic
    Daneshgar, Fateme Faraji
    Abbaspour, Maghsoud
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (13)
  • [50] The method of P2P traffic detecting for P2P harmful contents prevention
    Lee, HG
    Nam, TY
    Jang, JS
    [J]. 7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 777 - 780