Full Text:   <2719>

Summary:  <1856>

CLC number: TP393

On-line Access: 2015-05-05

Received: 2014-07-22

Revision Accepted: 2014-12-12

Crosschecked: 2015-04-09

Cited: 2

Clicked: 6076

Citations:  Bibtex RefMan EndNote GB/T7714

 ORCID:

Jie He

http://orcid.org/0000-0003-2244-7594

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.5 P.391-403

http://doi.org/10.1631/FITEE.1400267


Fine-grained P2P traffic classification by simply counting flows


Author(s):  Jie He, Yue-xiang Yang, Yong Qiao, Wen-ping Deng

Affiliation(s):  College of Computer, National University of Defense Technology, Changsha 410073, China; more

Corresponding email(s):   hejie@nudt.edu.cn, yyx@nudt.edu.cn, brave_jo@163.com, wpdeng.nudt@gmail.com

Key Words:  Traffic classification, Peer-to-peer (P2P), Fine-grained, Host-based


Jie He, Yue-xiang Yang, Yong Qiao, Wen-ping Deng. Fine-grained P2P traffic classification by simply counting flows[J]. Frontiers of Information Technology & Electronic Engineering, 2015, 16(5): 391-403.

@article{title="Fine-grained P2P traffic classification by simply counting flows",
author="Jie He, Yue-xiang Yang, Yong Qiao, Wen-ping Deng",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="16",
number="5",
pages="391-403",
year="2015",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.1400267"
}

%0 Journal Article
%T Fine-grained P2P traffic classification by simply counting flows
%A Jie He
%A Yue-xiang Yang
%A Yong Qiao
%A Wen-ping Deng
%J Frontiers of Information Technology & Electronic Engineering
%V 16
%N 5
%P 391-403
%@ 2095-9184
%D 2015
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.1400267

TY - JOUR
T1 - Fine-grained P2P traffic classification by simply counting flows
A1 - Jie He
A1 - Yue-xiang Yang
A1 - Yong Qiao
A1 - Wen-ping Deng
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 16
IS - 5
SP - 391
EP - 403
%@ 2095-9184
Y1 - 2015
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.1400267


Abstract: 
The continuous emerging of peer-to-peer (P2P) applications enriches resource sharing by networks, but it also brings about many challenges to network management. Therefore, P2P applications monitoring, in particular, P2P traffic classification, is becoming increasingly important. In this paper, we propose a novel approach for accurate P2P traffic classification at a fine-grained level. Our approach relies only on counting some special flows that are appearing frequently and steadily in the traffic generated by specific P2P applications. In contrast to existing methods, the main contribution of our approach can be summarized as the following two aspects. Firstly, it can achieve a high classification accuracy by exploiting only several generic properties of flows rather than complicated features and sophisticated techniques. Secondly, it can work well even if the classification target is running with other high bandwidth-consuming applications, outperforming most existing host-based approaches, which are incapable of dealing with this situation. We evaluated the performance of our approach on a real-world trace. Experimental results show that P2P applications can be classified with a true positive rate higher than 97.22% and a false positive rate lower than 2.78%.

This paper makes use of host based statistics to answer the question as to whether or not a host is running a peer to peer application. The idea of exploiting special flows for detecting specific P2P protocols/implementations is neat. The application of a clustering algorithm for automatically identifying special flows makes the approach flexibile and extensibile.

基于簇流的细粒度P2P流量分类

目的:P2P流量的不断增长带来网络管理和安全方面的各类问题。因此对P2P流量进行精确分类显得尤为重要。本文旨在提出一种能对P2P流量实现高效精确且细粒度分类的方法。
创新点:本文方法不依赖于对报文负载内容的检查,也无需借助复杂的统计特征和机器学习方法。仅利用网络流的几个基本属性就能实现对P2P流量的精确且细粒度分类。当待检测主机的网络流量组成较为复杂时,其他基于主机的流量分类方法将失效,但本文方法仍然有效。
方法:首先,将P2P应用产生的流量中出现最频繁且稳定的相似流簇定义为簇流,并认为一组簇流是由一类P2P网络活动所产生(图2)。本文P2P流量分类方法分两步进行(图3)。在簇流提取阶段,为每一种P2P应用采集训练流量集,并从中提取出对应的簇流集合。在流量分类阶段,监测待检测主机在单位时间窗口内所产生的簇流的类型和数量,并根据一个记分函数对流量进行分类。
结论:提出一种能对P2P流量实现高效精确且细粒度分类的方法。根据现实流量评价所提方法的性能。实验结果达到高于97.22%的正确率和低于2.78%的误报率。

关键词:流量分类;P2P网络;细粒度;基于主机

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1]Auld, T., Moore, A.W., Gull, S.F., 2007. Bayesian neural networks for Internet traffic classification. IEEE Trans. Neur. Netw., 18(1):223-239.

[2]Ban, T., Guo, S., Eto, M., et al., 2012. A study on cost-effective P2P traffic classification. Proc. Int. Joint Conf. on Neural Networks, p.1-7.

[3]Basher, N., Mahanti, A., Mahanti, A., et al., 2008. A comparative analysis of web and peer-to-peer traffic. Proc. 17th Int. Conf. on World Wide Web, p.287-296.

[4]Bermolen, P., Mellia, M., Meo, M., et al., 2011. Abacus: accurate behavioral classification of P2P-TV traffic. Comput. Netw., 55(6):1394-1411.

[5]Chen, J.B., 2011. Fuzzy based approach for P2P file sharing detection. J. Internet Technol., 12(6):921-930.

[6]Dainotti, A., Pescapè, A., Claffy, K.C., 2012. Issues and future directions in traffic classification. IEEE Network, 26(1):35-40.

[7]Dhamankar, R., King, R., 2007. Protocol Identification via Statistical Analysis (PISA). White Paper, Tipping Point.

[8]Este, A., Gringoli, F., Salgarelli, L., 2009. On the stability of the information carried by traffic flow features at the packet level. ACM SIGCOMM Comput. Commun. Rev., 39(3):13-18.

[9]Finamore, A., Mellia, M., Meo, M., et al., 2010. KISS: stochastic packet inspection classifier for UDP traffic. IEEE/ACM Trans. Netw., 18(5):1505-1515.

[10]Gallagher, B., Iliofotou, M., Eliassi-Rad, T., et al., 2010. Link homophily in the application layer and its usage in traffic classification. Proc. IEEE INFOCOM, p.1-5.

[11]Gomes, J.V., Inácio, P.R.M., Pereira, M., et al., 2013. Detection and classification of peer-to-peer traffic: a survey. ACM Comput. Surv., 45(3), Article 30.

[12]He, J., Yang, Y., Qiao, Y., et al., 2013. Accurate classification of P2P traffic by clustering flows. China Commun., 10(11):42-51.

[13]Huang, N.F., Jai, G.Y., Chao, H.C., 2008. Early identifying application traffic with application characteristics. Proc. IEEE Int. Conf. on Communications, p.5788-5792.

[14]Hullár, B., Laki, S., Gyorgy, A., 2011. Early identification of peer-to-peer traffic. Proc. IEEE Int. Conf. on Communications, p.1-6.

[15]Hurley, J., Garcia-Palacios, E., Sezer, S., 2011. Host-based P2P flow identification and use in real-time. ACM Trans. Web, 5(2), Article 7.

[16]Iliofotou, M., Kim, H., Faloutsos, M., et al., 2011. Graption: a graph-based P2P traffic classification framework for the Internet backbone. Comput. Netw., 55(8):1909-1920.

[17]Karagiannis, T., Papagiannaki, K., Faloutsos, M., 2005. BLINC: multilevel traffic classification in the dark. ACM SIGCOMM Comput. Commun. Rev., 35(4):229-240.

[18]Moore, A., Zuev, D., Crogan, M., 2005. Discriminators for Use in Flow-Based Classification. Technical Report, University of London, UK.

[19]Nguyen, T.T.T., Armitage, G., 2008. Clustering to assist supervised machine learning for real-time IP traffic classification. Proc. IEEE Int. Conf. on Communications, p.5857-5862.

[20]Ohzahata, S., Hagiwara, Y., Terada, M., et al., 2005. A traffic identification method and evaluations for a pure P2P application. Proc. 6th Int. Workshop on Passive and Active Network Measurement, p.55-68.

[21]Sandvine, 2014. Global Internet Phenomena Report 1H 2014. Technical Report. Sandvine Incorporated ULC, Waterloo, Ontario, Canada.

[22]Tabatabaei, T.S., Adel, M., Karray, F., et al., 2012. Machine learning-based classification of encrypted Internet traffic. Proc. 8th Int. Conf. on Machine Learning and Data Mining in Pattern Recognition, p.578-592.

[23]Valenti, S., Rossi, D., 2011. Identifying key features for P2P traffic classification. Proc. IEEE Int. Conf. on Communications, p.1-6.

[24]Yang, D., Zhang, Y., Zhang, H., et al., 2009. Multi-factors oriented study of P2P Churn. Int. J. Commun. Syst., 22(9):1089-1103.

[25]Zhang, T., Ramakrishnan, R., Livny, M., 1996. BIRCH: an efficient data clustering method for very large databases. ACM SIGMOD Rec., 25(2):103-114.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE