Peer-to-Peer (P2P) technology is one of the most popular techniques nowadays, and accurate identification of P2P traffic is important for many network activities. The classification of network traffic by using port-ba...Peer-to-Peer (P2P) technology is one of the most popular techniques nowadays, and accurate identification of P2P traffic is important for many network activities. The classification of network traffic by using port-based or payload-based analysis is becoming increasingly difficult when many applications use dynamic port numbers, masquerading techniques, and encryption to avoid detection. A novel method for P2P traffic identification is proposed in this work, and the methodology relies only on the statistics of end-point, which is a pair of destination IP address and destination port. Features of end-point behaviors are extracted and with which the Support Vector Machine classification model is built. The experimental results demonstrate that this method can classify network applications by using TCP or UDP protocol effectively. A large set of experiments has been carried over to assess the performance of this approach, and the results prove that the proposed approach has good performance both at accuracy and robustness.展开更多
P2P traffic has always been a dominant portion of Internet traffic since its emergence in the late 1990s. The method used to accurately classify P2P traffic remains a key problem for Internet Service Producers (ISPs...P2P traffic has always been a dominant portion of Internet traffic since its emergence in the late 1990s. The method used to accurately classify P2P traffic remains a key problem for Internet Service Producers (ISPs) and network managers. This paper proposes a novel approach to the accurate classification of P2P traffic at a fine-grained level, which depends solely on the number of special flows during small time intervals. These special flows, named Clustering Flows (CFs), are de- fined as the most frequent and steady flows generated by P2P applications. Hence we are able to classify P2P applications by detecting tlle appearance of corresponding CFs. Com- pared to existing approaches, our classifier can realise high classification accuracy by ex- ploiting only several generic properties of flows, instead of extracting sophisticated fea- tures from host behaviours or transport layer data. We validate our framework on a large set of P2P traffic traces using a Support Vector Machine (SVM). Experimental results show that our approach correctly classifies P2P ap- plications with an average true positive rate of above 98% and a negligible false positive rate of about 0.01%.展开更多
The growing P2P streaming traffic brings a variety of problems and challenges to ISP networks and service providers.A P2P streaming traffic classification method based on sampling technology is presented in this paper...The growing P2P streaming traffic brings a variety of problems and challenges to ISP networks and service providers.A P2P streaming traffic classification method based on sampling technology is presented in this paper.By analyzing traffic statistical features and network behavior of P2P streaming,a group of flow characteristics were found,which can make P2P streaming more recognizable among other applications.Attributes from Netflow and those proposed by us are compared in terms of classification accuracy,and so are the results of different sampling rates.It is proved that the unified classification model with the proposed attributes can identify P2P streaming quickly and efficiently in the online system.Even with 1:50 sampling rate,the recognition accuracy can be higher than 94%.Moreover,we have evaluated the CPU resources,storage capacity and time consumption before and after the sampling,it is shown that the classification model after the sampling can significantly reduce the resource requirements with the same recognition accuracy.展开更多
The fundament of managing P2P traffic is identifying various P2P flows accurately. Although many P2P flows identification methods are presented nowadays, there are no ideas for either integrating these independent met...The fundament of managing P2P traffic is identifying various P2P flows accurately. Although many P2P flows identification methods are presented nowadays, there are no ideas for either integrating these independent methods together or being extended fast to support new method. In this work, an extensible P2P flows identification architecture (EPFIA for short) is proposed. In order to identify many specific P2P flows, EPFIA uses many different identification methods simultaneously, and obtains the highest efficiency via adjusting their identification sequence. An online mechanism of renewing identification methods is designed, which can extend new identification method without compiling the whole program. Applying policy mechanism, identification methods can be updated, started and halted remotely. The experiment results of running the prototype system show us that EPFIA could effectively promote the performance of system and support online renew P2P identification methods and manage them remotely.展开更多
This paper focuses on the key technologies of P2P technology and network traffic monitoring, which focuses on AC automaton and bypass interference control technology, and on based of it, we design a new P2P traffic mo...This paper focuses on the key technologies of P2P technology and network traffic monitoring, which focuses on AC automaton and bypass interference control technology, and on based of it, we design a new P2P traffic monitoring system. The system uses DPI and DFI recognition technology, as well as straight loss and bypass interference control technology, basically meet the recognition and control of P2P traffic. Finally, the test results show that this system recognition accuracy of P2P traffic is high, good control effect, function and performance meet the design requirements.展开更多
This article focuses on identifying file-sharing peer-to-peer (P2P) (such as BitTorrent (BT)) traffic at the borders of a stub network. By analyzing protocols and traffic of applications, it is found that file-s...This article focuses on identifying file-sharing peer-to-peer (P2P) (such as BitTorrent (BT)) traffic at the borders of a stub network. By analyzing protocols and traffic of applications, it is found that file-sharing P2P traffic of a single user differs greatly from traditional and other P2P (such as QQ) applications' traffic in the distribution of involved remote hosts and remote ports. Therefore, a method based on discreteness of remote hosts (RHD) and discreteness of remote ports (RPD) is proposed to identify BT-like traffic. This method only relies on flow information of each user host in a stub network, and no packet payload needs to be monitored. At intervals, instant RHD for concurrent transmission control protocol and user datagram protocol flows for each host are calculated respectively through grouping flows by the stub network that the remote host of each flow belongs to. On given conditions, instant RPD are calculated through grouping flows by the remote port to amend instant RHD. Whether a host has been using a BT-like application or not can be deduced from instant RHD or average RHD for a period of time. The proposed method based on traffic characteristics is more suitable for identifying protean file-sharing P2P traffic than content-based methods Experimental results show that this method is effective with high accuracy.展开更多
The continuous emerging of peer-to-peer(P2P) applications enriches resource sharing by networks, but it also brings about many challenges to network management. Therefore, P2 P applications monitoring, in particular,P...The continuous emerging of peer-to-peer(P2P) applications enriches resource sharing by networks, but it also brings about many challenges to network management. Therefore, P2 P applications monitoring, in particular,P2 P traffic classification, is becoming increasingly important. In this paper, we propose a novel approach for accurate P2 P traffic classification at a fine-grained level. Our approach relies only on counting some special flows that are appearing frequently and steadily in the traffic generated by specific P2 P applications. In contrast to existing methods, the main contribution of our approach can be summarized as the following two aspects. Firstly, it can achieve a high classification accuracy by exploiting only several generic properties of flows rather than complicated features and sophisticated techniques. Secondly, it can work well even if the classification target is running with other high bandwidth-consuming applications, outperforming most existing host-based approaches, which are incapable of dealing with this situation. We evaluated the performance of our approach on a real-world trace. Experimental results show that P2 P applications can be classified with a true positive rate higher than 97.22% and a false positive rate lower than 2.78%.展开更多
Peer-to-peer(P2P) computing technology has been widely used on the Internet to exchange data. However, it occupies much network bandwidth, and thus greatly influences traditional business on the Internet. Besides, p...Peer-to-peer(P2P) computing technology has been widely used on the Internet to exchange data. However, it occupies much network bandwidth, and thus greatly influences traditional business on the Internet. Besides, problems about free-riders and 'tragedy of the commons' in the P2P environment estrange from it P2P users who constantly contribute to the network with quality resources. This article proposes a new P2P network traffic control mechanism based on global evaluation values. It aims to help individual users to avoid peak traffic time as much as possible, ease network congestion and protect traditional business on the Internet, as well as differentiating priority grades of peers according to their contributions and stimulating them to share their valuable resources actively. This article first analyzes the current state of network traffic, and then elaborates on P2P network traffic control policies and proposes the peer's priority level differentiation mechanism based on global evaluation values. Finally, after the testing results and analysis of the proposed P2P network traffic control mechanism are discussed, conclusions are drawn.展开更多
As the rapid growth of mobile social networks,mobile peer-to-peer(P2P)communications and mobile edge computing(MEC)have been developed to reduce the traffic load and improve the computation capacity of cellular networ...As the rapid growth of mobile social networks,mobile peer-to-peer(P2P)communications and mobile edge computing(MEC)have been developed to reduce the traffic load and improve the computation capacity of cellular networks.However,the stability of social network is largely ignored in the advances of P2P and MEC,which is related to the social relations between users.It plays a vital role in improving the efficiency and reliability of traffic offloading service.In this paper,we integrate an edge node and the nearby P2P users as a mobile P2P social network and introduce the problem of adaptive anchored(k,r)-core to maintain the stability of multiple mobile P2P networks.It aims to adaptively select and retain a set of critical users for each network,whose participation is critical to overall stability of the network,and allocate certain resource for them so that the maximum number of users of all networks will remain engaged and the traffic of cellular network can be minimized.We called the retained users as anchor vertices.To address it,we devise a peer-edge-cloud framework to achieve the adaptive allocation of resources.We also develop a similarity based onion layers anchored(k,r)-core(S-OLAK)algorithm to explore the anchor vertices.Experimental results based on a real large-scale mobile P2P data set demonstrate the effectiveness of our method.展开更多
Microglia are the tissue resident macrophages of the brain and represent the sole immune population located in the parenchyma of the central nervous system (CNS). These cells are hidden be-tween neurons, astrocytes ...Microglia are the tissue resident macrophages of the brain and represent the sole immune population located in the parenchyma of the central nervous system (CNS). These cells are hidden be-tween neurons, astrocytes as well as oligodendrocytes and account for only 5-10% of CNS cells. Even though microglia were already identified in 1913 by the Spanish neuroanatomist Ramon y Cajal and further seminally investigated by his student Pio del Rio Hortega,展开更多
To address cross-ISP traffic problem caused by BitTorrent,we present our design and evaluation of a proximity-aware BitTorrent system. In our approach,clients generate global proximity-aware information by using landm...To address cross-ISP traffic problem caused by BitTorrent,we present our design and evaluation of a proximity-aware BitTorrent system. In our approach,clients generate global proximity-aware information by using landmark clustering;the tracker uses this proximity to maintain all peers in an orderly way and hands back a biased subset consisting of the peers who are physically closest to the requestor. Our approach requires no co-operation between P2P users and their Internet infra structures,such as ISPs or CDNs,no constantly path monitoring or probing their neighbors. The simulation results show that our approach can not only reduce unnecessary cross-ISP traffic,but also allow downloadsing fast.展开更多
基金Sonsored by the National Key Technology R&D Program(Grant No.2102BAH18B05)
文摘Peer-to-Peer (P2P) technology is one of the most popular techniques nowadays, and accurate identification of P2P traffic is important for many network activities. The classification of network traffic by using port-based or payload-based analysis is becoming increasingly difficult when many applications use dynamic port numbers, masquerading techniques, and encryption to avoid detection. A novel method for P2P traffic identification is proposed in this work, and the methodology relies only on the statistics of end-point, which is a pair of destination IP address and destination port. Features of end-point behaviors are extracted and with which the Support Vector Machine classification model is built. The experimental results demonstrate that this method can classify network applications by using TCP or UDP protocol effectively. A large set of experiments has been carried over to assess the performance of this approach, and the results prove that the proposed approach has good performance both at accuracy and robustness.
基金supported by the National Natural Science Foundation of China under Grants No.61170286,No.61202486
文摘P2P traffic has always been a dominant portion of Internet traffic since its emergence in the late 1990s. The method used to accurately classify P2P traffic remains a key problem for Internet Service Producers (ISPs) and network managers. This paper proposes a novel approach to the accurate classification of P2P traffic at a fine-grained level, which depends solely on the number of special flows during small time intervals. These special flows, named Clustering Flows (CFs), are de- fined as the most frequent and steady flows generated by P2P applications. Hence we are able to classify P2P applications by detecting tlle appearance of corresponding CFs. Com- pared to existing approaches, our classifier can realise high classification accuracy by ex- ploiting only several generic properties of flows, instead of extracting sophisticated fea- tures from host behaviours or transport layer data. We validate our framework on a large set of P2P traffic traces using a Support Vector Machine (SVM). Experimental results show that our approach correctly classifies P2P ap- plications with an average true positive rate of above 98% and a negligible false positive rate of about 0.01%.
基金supported by State Key Program of National Natural Science Foundation of China under Grant No.61072061111 Project of China under Grant No.B08004the Fundamental Research Funds for the Central Universities under Grant No.2009RC0122
文摘The growing P2P streaming traffic brings a variety of problems and challenges to ISP networks and service providers.A P2P streaming traffic classification method based on sampling technology is presented in this paper.By analyzing traffic statistical features and network behavior of P2P streaming,a group of flow characteristics were found,which can make P2P streaming more recognizable among other applications.Attributes from Netflow and those proposed by us are compared in terms of classification accuracy,and so are the results of different sampling rates.It is proved that the unified classification model with the proposed attributes can identify P2P streaming quickly and efficiently in the online system.Even with 1:50 sampling rate,the recognition accuracy can be higher than 94%.Moreover,we have evaluated the CPU resources,storage capacity and time consumption before and after the sampling,it is shown that the classification model after the sampling can significantly reduce the resource requirements with the same recognition accuracy.
文摘The fundament of managing P2P traffic is identifying various P2P flows accurately. Although many P2P flows identification methods are presented nowadays, there are no ideas for either integrating these independent methods together or being extended fast to support new method. In this work, an extensible P2P flows identification architecture (EPFIA for short) is proposed. In order to identify many specific P2P flows, EPFIA uses many different identification methods simultaneously, and obtains the highest efficiency via adjusting their identification sequence. An online mechanism of renewing identification methods is designed, which can extend new identification method without compiling the whole program. Applying policy mechanism, identification methods can be updated, started and halted remotely. The experiment results of running the prototype system show us that EPFIA could effectively promote the performance of system and support online renew P2P identification methods and manage them remotely.
文摘This paper focuses on the key technologies of P2P technology and network traffic monitoring, which focuses on AC automaton and bypass interference control technology, and on based of it, we design a new P2P traffic monitoring system. The system uses DPI and DFI recognition technology, as well as straight loss and bypass interference control technology, basically meet the recognition and control of P2P traffic. Finally, the test results show that this system recognition accuracy of P2P traffic is high, good control effect, function and performance meet the design requirements.
基金the National Basic Research Program of China (2003CB314804)the Research Program of NUPT (NY206010)
文摘This article focuses on identifying file-sharing peer-to-peer (P2P) (such as BitTorrent (BT)) traffic at the borders of a stub network. By analyzing protocols and traffic of applications, it is found that file-sharing P2P traffic of a single user differs greatly from traditional and other P2P (such as QQ) applications' traffic in the distribution of involved remote hosts and remote ports. Therefore, a method based on discreteness of remote hosts (RHD) and discreteness of remote ports (RPD) is proposed to identify BT-like traffic. This method only relies on flow information of each user host in a stub network, and no packet payload needs to be monitored. At intervals, instant RHD for concurrent transmission control protocol and user datagram protocol flows for each host are calculated respectively through grouping flows by the stub network that the remote host of each flow belongs to. On given conditions, instant RPD are calculated through grouping flows by the remote port to amend instant RHD. Whether a host has been using a BT-like application or not can be deduced from instant RHD or average RHD for a period of time. The proposed method based on traffic characteristics is more suitable for identifying protean file-sharing P2P traffic than content-based methods Experimental results show that this method is effective with high accuracy.
基金supported by the National Natural Science Foundation of China(Nos.61170286 and 61202486)
文摘The continuous emerging of peer-to-peer(P2P) applications enriches resource sharing by networks, but it also brings about many challenges to network management. Therefore, P2 P applications monitoring, in particular,P2 P traffic classification, is becoming increasingly important. In this paper, we propose a novel approach for accurate P2 P traffic classification at a fine-grained level. Our approach relies only on counting some special flows that are appearing frequently and steadily in the traffic generated by specific P2 P applications. In contrast to existing methods, the main contribution of our approach can be summarized as the following two aspects. Firstly, it can achieve a high classification accuracy by exploiting only several generic properties of flows rather than complicated features and sophisticated techniques. Secondly, it can work well even if the classification target is running with other high bandwidth-consuming applications, outperforming most existing host-based approaches, which are incapable of dealing with this situation. We evaluated the performance of our approach on a real-world trace. Experimental results show that P2 P applications can be classified with a true positive rate higher than 97.22% and a false positive rate lower than 2.78%.
基金supported by the National Natural Science Foundation of China(60573141,60773041)the Hi-Tech Research Program of China(2006AA01Z201,2006AA01Z439,2007AA01Z404,2007AA01Z478)+3 种基金the High Technology Research Program of Jiangsu Province(BG2006001)the High Technology Research Program of Nanjing(2007RZ127)Foundation of the National Laboratory for Modern Communications(9140C1105040805)the Science & Technology Innovation Fund for Higher Education Institutions of Jiangsu Province(CX08B-085Z,CX08B-086Z)
文摘Peer-to-peer(P2P) computing technology has been widely used on the Internet to exchange data. However, it occupies much network bandwidth, and thus greatly influences traditional business on the Internet. Besides, problems about free-riders and 'tragedy of the commons' in the P2P environment estrange from it P2P users who constantly contribute to the network with quality resources. This article proposes a new P2P network traffic control mechanism based on global evaluation values. It aims to help individual users to avoid peak traffic time as much as possible, ease network congestion and protect traditional business on the Internet, as well as differentiating priority grades of peers according to their contributions and stimulating them to share their valuable resources actively. This article first analyzes the current state of network traffic, and then elaborates on P2P network traffic control policies and proposes the peer's priority level differentiation mechanism based on global evaluation values. Finally, after the testing results and analysis of the proposed P2P network traffic control mechanism are discussed, conclusions are drawn.
基金This work was supported by National Key Research and Development Program of China under Grant 2019YFB2101901 and 2018YFC0809803National Natural Science Foundation of China under Grant 61702364.
文摘As the rapid growth of mobile social networks,mobile peer-to-peer(P2P)communications and mobile edge computing(MEC)have been developed to reduce the traffic load and improve the computation capacity of cellular networks.However,the stability of social network is largely ignored in the advances of P2P and MEC,which is related to the social relations between users.It plays a vital role in improving the efficiency and reliability of traffic offloading service.In this paper,we integrate an edge node and the nearby P2P users as a mobile P2P social network and introduce the problem of adaptive anchored(k,r)-core to maintain the stability of multiple mobile P2P networks.It aims to adaptively select and retain a set of critical users for each network,whose participation is critical to overall stability of the network,and allocate certain resource for them so that the maximum number of users of all networks will remain engaged and the traffic of cellular network can be minimized.We called the retained users as anchor vertices.To address it,we devise a peer-edge-cloud framework to achieve the adaptive allocation of resources.We also develop a similarity based onion layers anchored(k,r)-core(S-OLAK)algorithm to explore the anchor vertices.Experimental results based on a real large-scale mobile P2P data set demonstrate the effectiveness of our method.
基金supported by the Deutsche Forschungsgemeinschaft(DFGMI1328)
文摘Microglia are the tissue resident macrophages of the brain and represent the sole immune population located in the parenchyma of the central nervous system (CNS). These cells are hidden be-tween neurons, astrocytes as well as oligodendrocytes and account for only 5-10% of CNS cells. Even though microglia were already identified in 1913 by the Spanish neuroanatomist Ramon y Cajal and further seminally investigated by his student Pio del Rio Hortega,
基金supported in part by the National High-tech Research and Development Program (863 Program) of China under Grant No. 2009AA01Z210, No. 2009AA01Z250 and No. 2008AA01A324support from Guangdong Ministry of Education Industry-Academia-Research project No. 2009B090300315EU FP7 Project (INFSO-ICT- 215549)
文摘To address cross-ISP traffic problem caused by BitTorrent,we present our design and evaluation of a proximity-aware BitTorrent system. In our approach,clients generate global proximity-aware information by using landmark clustering;the tracker uses this proximity to maintain all peers in an orderly way and hands back a biased subset consisting of the peers who are physically closest to the requestor. Our approach requires no co-operation between P2P users and their Internet infra structures,such as ISPs or CDNs,no constantly path monitoring or probing their neighbors. The simulation results show that our approach can not only reduce unnecessary cross-ISP traffic,but also allow downloadsing fast.