Multi-Level P2P Traffic Classification Using Heuristic and Statistical-Based Techniques: A Hybrid Approach

被引:8
|
作者
Bhatia, Max [1 ]
Sharma, Vikrant [1 ]
Singh, Parminder [1 ]
Masud, Mehedi [2 ]
机构
[1] Lovely Profess Univ, Dept Comp Sci Engn, Phagwara 144001, Punjab, India
[2] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, POB 11099, At Taif 21944, Saudi Arabia
来源
SYMMETRY-BASEL | 2020年 / 12卷 / 12期
关键词
heuristic-based classification; multi-level P2P traffic classification; P2P-port based classification; statistical-based classification; IDENTIFICATION;
D O I
10.3390/sym12122117
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Peer-to-peer (P2P) applications have been popular among users for more than a decade. They consume a lot of network bandwidth, due to the fact that network administrators face several issues such as congestion, security, managing resources, etc. Hence, its accurate classification will allow them to maintain a Quality of Service for various applications. Conventional classification techniques, i.e., port-based and payload-based techniques alone, have proved ineffective in accurately classifying P2P traffic as they possess significant limitations. As new P2P applications keep emerging and existing applications change their communication patterns, a single classification approach may not be sufficient to classify P2P traffic with high accuracy. Therefore, a multi-level P2P traffic classification technique is proposed in this paper, which utilizes the benefits of both heuristic and statistical-based techniques. By analyzing the behavior of various P2P applications, some heuristic rules have been proposed to classify P2P traffic. The traffic which remains unclassified as P2P undergoes further analysis, where statistical-features of traffic are used with the C4.5 decision tree for P2P classification. The proposed technique classifies P2P traffic with high accuracy (i.e., 98.30%), works with both TCP and UDP traffic, and is not affected even if the traffic is encrypted.
引用
收藏
页码:1 / 22
页数:22
相关论文
共 50 条
  • [1] Hybrid P2P traffic classification with heuristic rules and machine learning
    Ye, Wujian
    Cho, Kyungsan
    [J]. SOFT COMPUTING, 2014, 18 (09) : 1815 - 1827
  • [2] Hybrid P2P traffic classification with heuristic rules and machine learning
    Wujian Ye
    Kyungsan Cho
    [J]. Soft Computing, 2014, 18 : 1815 - 1827
  • [3] A multi-level super peer based P2P architecture
    Cao, Zhao
    Li, Kan
    Liu, Yushu
    [J]. 2008 THE INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2008, : 360 - 364
  • [4] Blockchain-based multi-level scoring system for P2P clusters
    Gattermayer, Josef
    Tvrdik, Pavel
    [J]. 2017 46TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS (ICPPW), 2017, : 301 - 308
  • [5] P2P Traffic Identification Method Based on Traffic Statistical Characteristics
    Hu, Bing
    Sun, Zhixin
    [J]. INTELLIGENT COMPUTING THEORIES AND APPLICATION, ICIC 2017, PT I, 2017, 10361 : 260 - 272
  • [6] P2P Traffic Classification Using Clustering Technology
    Tseng, Chuan-Mu
    Huang, Guo-Tai
    Liu, Tzong-Jye
    [J]. 2016 IEEE/SICE INTERNATIONAL SYMPOSIUM ON SYSTEM INTEGRATION (SII), 2016, : 174 - 179
  • [7] P2P Traffic Classification method Based on the PNN
    Lei, Chang
    Feng, Li
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [8] A P2P Traffic Classification Method Based on SVM
    Zhou Xusheng
    [J]. ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 53 - 57
  • [9] Multi-level Architecture for P2P Services in Mobile Networks
    Pirmagomedov, Rustam
    Ahmed, Aram A.
    Glushakov, Ruslan
    [J]. INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2019, RUSMART 2019, 2019, 11660 : 415 - 423
  • [10] A Heuristic Approach to P2P Negotiation
    Costantini, Stefania
    Tocchio, Arianna
    Tsintza, Panagiota
    [J]. COMPUTATIONAL LOGIC IN MULTI-AGENT SYSTEMS, 2008, 5056 : 177 - 192