P2P Applications Identification Based on the Statistics Analysis of Packet Length
These years, P2P applications are very popular on the Internet and take a big part of the Internet traffic workload. Identifying the P2P traffic and understanding their behavior is an important field. However, previous P2P traffic identification methods by examining user payload or well-defined port...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 163 |
---|---|
container_issue | |
container_start_page | 160 |
container_title | |
container_volume | |
creator | Feng Liu Zhitang Li Junfeng Yu |
description | These years, P2P applications are very popular on the Internet and take a big part of the Internet traffic workload. Identifying the P2P traffic and understanding their behavior is an important field. However, previous P2P traffic identification methods by examining user payload or well-defined port numbers no longer adapt to current P2P applications. In this paper, we develop a statistical methodology by analyzing packet length and the P2P basic characteristic, P2P nodes can serve as a server and client at the same time, to identify P2P flows at the transport layer without relying on the port numbers and packet payload. |
doi_str_mv | 10.1109/IEEC.2009.38 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5175094</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5175094</ieee_id><sourcerecordid>5175094</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-bc9d908ecc72936e8cbee93bec5ba0d81f565bf18b6ed1369777bfc627b8e0583</originalsourceid><addsrcrecordid>eNotjLtOwzAUhi2hSkDJxsbiF0iwY3w5Y4gCRIpEEDBXtnNCDSWNai99e4Laf_lv0kfILWcF5wzu26api5IxKIS5IBlow7QCKZRRakWu_x9gQmm4JFmM32yRAMmVuCJvfdnTap53wdsU9lOk7YBTCuO500cbcaBLSFuk72kZYwo-0mqyu2MMke5H2lv_g4l2OH2l7Q1ZjXYXMTv7mnw-NR_1S969Prd11eWBa5ly52EAZtB7XYJQaLxDBOHQS2fZYPgolXQjN07hwIUCrbUbvSq1M8ikEWtyd-IGRNzMh_BrD8eNXOAMHsQfdnxP2w</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>P2P Applications Identification Based on the Statistics Analysis of Packet Length</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Feng Liu ; Zhitang Li ; Junfeng Yu</creator><creatorcontrib>Feng Liu ; Zhitang Li ; Junfeng Yu</creatorcontrib><description>These years, P2P applications are very popular on the Internet and take a big part of the Internet traffic workload. Identifying the P2P traffic and understanding their behavior is an important field. However, previous P2P traffic identification methods by examining user payload or well-defined port numbers no longer adapt to current P2P applications. In this paper, we develop a statistical methodology by analyzing packet length and the P2P basic characteristic, P2P nodes can serve as a server and client at the same time, to identify P2P flows at the transport layer without relying on the port numbers and packet payload.</description><identifier>ISBN: 9780769536866</identifier><identifier>ISBN: 0769536867</identifier><identifier>DOI: 10.1109/IEEC.2009.38</identifier><identifier>LCCN: 2009903679</identifier><language>eng</language><publisher>IEEE</publisher><subject>Application software ; Computer science ; Cryptography ; Electronic commerce ; Information analysis ; Internet ; P2P traffic identification ; packet length ; Pattern analysis ; Payloads ; Statistical analysis ; statistics analysis ; Telecommunication traffic</subject><ispartof>2009 International Symposium on Information Engineering and Electronic Commerce, 2009, p.160-163</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5175094$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5175094$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Feng Liu</creatorcontrib><creatorcontrib>Zhitang Li</creatorcontrib><creatorcontrib>Junfeng Yu</creatorcontrib><title>P2P Applications Identification Based on the Statistics Analysis of Packet Length</title><title>2009 International Symposium on Information Engineering and Electronic Commerce</title><addtitle>IEEC</addtitle><description>These years, P2P applications are very popular on the Internet and take a big part of the Internet traffic workload. Identifying the P2P traffic and understanding their behavior is an important field. However, previous P2P traffic identification methods by examining user payload or well-defined port numbers no longer adapt to current P2P applications. In this paper, we develop a statistical methodology by analyzing packet length and the P2P basic characteristic, P2P nodes can serve as a server and client at the same time, to identify P2P flows at the transport layer without relying on the port numbers and packet payload.</description><subject>Application software</subject><subject>Computer science</subject><subject>Cryptography</subject><subject>Electronic commerce</subject><subject>Information analysis</subject><subject>Internet</subject><subject>P2P traffic identification</subject><subject>packet length</subject><subject>Pattern analysis</subject><subject>Payloads</subject><subject>Statistical analysis</subject><subject>statistics analysis</subject><subject>Telecommunication traffic</subject><isbn>9780769536866</isbn><isbn>0769536867</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjLtOwzAUhi2hSkDJxsbiF0iwY3w5Y4gCRIpEEDBXtnNCDSWNai99e4Laf_lv0kfILWcF5wzu26api5IxKIS5IBlow7QCKZRRakWu_x9gQmm4JFmM32yRAMmVuCJvfdnTap53wdsU9lOk7YBTCuO500cbcaBLSFuk72kZYwo-0mqyu2MMke5H2lv_g4l2OH2l7Q1ZjXYXMTv7mnw-NR_1S969Prd11eWBa5ly52EAZtB7XYJQaLxDBOHQS2fZYPgolXQjN07hwIUCrbUbvSq1M8ikEWtyd-IGRNzMh_BrD8eNXOAMHsQfdnxP2w</recordid><startdate>200905</startdate><enddate>200905</enddate><creator>Feng Liu</creator><creator>Zhitang Li</creator><creator>Junfeng Yu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200905</creationdate><title>P2P Applications Identification Based on the Statistics Analysis of Packet Length</title><author>Feng Liu ; Zhitang Li ; Junfeng Yu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-bc9d908ecc72936e8cbee93bec5ba0d81f565bf18b6ed1369777bfc627b8e0583</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Application software</topic><topic>Computer science</topic><topic>Cryptography</topic><topic>Electronic commerce</topic><topic>Information analysis</topic><topic>Internet</topic><topic>P2P traffic identification</topic><topic>packet length</topic><topic>Pattern analysis</topic><topic>Payloads</topic><topic>Statistical analysis</topic><topic>statistics analysis</topic><topic>Telecommunication traffic</topic><toplevel>online_resources</toplevel><creatorcontrib>Feng Liu</creatorcontrib><creatorcontrib>Zhitang Li</creatorcontrib><creatorcontrib>Junfeng Yu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Feng Liu</au><au>Zhitang Li</au><au>Junfeng Yu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>P2P Applications Identification Based on the Statistics Analysis of Packet Length</atitle><btitle>2009 International Symposium on Information Engineering and Electronic Commerce</btitle><stitle>IEEC</stitle><date>2009-05</date><risdate>2009</risdate><spage>160</spage><epage>163</epage><pages>160-163</pages><isbn>9780769536866</isbn><isbn>0769536867</isbn><abstract>These years, P2P applications are very popular on the Internet and take a big part of the Internet traffic workload. Identifying the P2P traffic and understanding their behavior is an important field. However, previous P2P traffic identification methods by examining user payload or well-defined port numbers no longer adapt to current P2P applications. In this paper, we develop a statistical methodology by analyzing packet length and the P2P basic characteristic, P2P nodes can serve as a server and client at the same time, to identify P2P flows at the transport layer without relying on the port numbers and packet payload.</abstract><pub>IEEE</pub><doi>10.1109/IEEC.2009.38</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780769536866 |
ispartof | 2009 International Symposium on Information Engineering and Electronic Commerce, 2009, p.160-163 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5175094 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Application software Computer science Cryptography Electronic commerce Information analysis Internet P2P traffic identification packet length Pattern analysis Payloads Statistical analysis statistics analysis Telecommunication traffic |
title | P2P Applications Identification Based on the Statistics Analysis of Packet Length |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T00%3A18%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=P2P%20Applications%20Identification%20Based%20on%20the%20Statistics%20Analysis%20of%20Packet%20Length&rft.btitle=2009%20International%20Symposium%20on%20Information%20Engineering%20and%20Electronic%20Commerce&rft.au=Feng%20Liu&rft.date=2009-05&rft.spage=160&rft.epage=163&rft.pages=160-163&rft.isbn=9780769536866&rft.isbn_list=0769536867&rft_id=info:doi/10.1109/IEEC.2009.38&rft_dat=%3Cieee_6IE%3E5175094%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5175094&rfr_iscdi=true |