Open Access Open Access  Restricted Access Subscription or Fee Access

Identification of P2P Traffic across the Networks: A Survey

M. Sadish Sendil, M. Kavitha, U. Kaleelurrahaman, Dr S. Karthik, Dr. N. Nagarajan

Abstract


Problem statement: In the last years, we have seen that the use of P2P applications has increased significantly and currently they represent a significant portion of the Internet traffic. In consequence of this growth, P2P traffic characterization and identification are becoming increasingly important for network administrators and designers. Also increasing amount of P2P services not only consuming a lot of bandwidth but also influencing the performance of other business. Another difficulty in identification of traffic in P2P is that P2P applications have the ability to disguise their existence through the use of arbitrary ports and explicitly try to camouflage the original traffic in an attempt to go undetected. In this paper we have analyzed different type of identification methods and compared the efficiency in each method. Approaches: 1. P2P traffic identification using Cluster analysis which seek five traffic discriminators and applies cluster analysis to identify P2P traffic. 2. P2P traffic identification based on double layer characteristics which identify traffic based on flow characteristics and payload characteristics. 3. Transport layer heuristic identification in which P2P traffic flows are identified by analyzing the statistical properties of the flows and their behavior characteristics. 4. Payload-based IP traffic identification packet payloads are analyzed to determine whether they contain specific signatures of known applications. Results: After analyzing each model we find out that there are both advantages and limitation in it. We have simulated those models and compared with each other. Conclusion and Future work: With the widely adoption of the P2P, the method for the control and the management to the P2P applications has become a research hotspot. In this paper we analyse different methods to identify the traffic in P2P application. In future we try to build a new algorithm which combines the best capabilities of the analyzed approaches.

Keywords


Cluster Analysis, Flow Characteristics, Payload Characteristics, Traffic Identificat

Full Text:

PDF

References


Liu Bin, LI Zhi-tang, LI Jia, New Method on P2P Traffic Identification Based on Flow [J]. Journal of Xiamen University (Natural Science), 46:132-135.

Sen, S. and Wang, D. Analyzing peer-to-peer traffic across large networks. In ACM SIGCOMM Internet Measurement Workshop, 2002

T.Karagiannis, A.Broido, M.Faloutsos. Transport Layer identification of P2P Traffic. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, ACM Press, New York, USA, 2004, 121~134.

Sen s, spatscheck o, wang dm. Accurate, Scalable In Net-work Identification of P2P Traffic Using Application Signatures [A]. WWW2004[C]. New York, USA, 2004.

Moore, A. and Zuev, D. Internet Traffic Classification Using Bayesian Analysis Techniques. In Proceedings of the 2005 ACM Sigmetrics International Conference on Measurements and Modeling of Computer Systems, 2005.

W. Moore, K. Papgiannaki. Toward the Accurate Identification of Network Applications. March 2005.

Fivos Constantinou, Panayiotis Mavrommatis. Identifying Known and Unknown Peer-to-Peer Traffic. In Fifth IEEE International Symposium on Network Computing and Applications, 2006.

Wagner A, Dubendorfer T, Hammerle L. Flow-Based Identification of P2P Heavy-Hitters. International Conference on Internet Surveillance and Protection, ICISP '06, 2006.

Sadish Sendil M, et al, “An Optimized Method for Analyzing the Peer to Peer Traffic”, European Journal of Scientific Research, Vol.34 No.4, pp.535-541, 2009.

Sadish Sendil M, et al, “Analyzing the Peer to Peer Traffic Aggregation Using an Optimized Method”, Journal of Computer Science 5 (10): 738-744, 2009

M. Sadish Sendil, et.al, “Analyzing the P2P Traffic Using Probability Schemes”, International Journal of computer science and information technology (IJCSIT), Vol.2, No.1, pp.85-94, 2010.

Marcell Perényi, et.al. 2006, “Identification and Analysis of Peer-to-Peer Traffic”, Journal of Communications, Vol. 1, No. 7, Nov. / Dec.

Chunzhi Wang, et.al., “P2P Traffic Identification Based on Double Layer Characteristics”, 2009 International Conference on Information Technology and Computer Science.

Gabriel Paulino Siqueira Juinior, et.al.,“P2P Traffic Identification using Cluster Analysis”, 1-4244-1376-1/07/$25.00 ©2007 IEEE.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.