吉林大学学报(工学版) ›› 2013, Vol. 43 ›› Issue (03): 727-733.doi: 10.7964/jdxbgxb201303028

Previous Articles     Next Articles

Identification approach of P2P flow based on the content redistribution model

XIAN Shu1,2, ZHENG Jin1,2, LU Xing3, ZHANG Shi-peng4   

  1. 1. School of Computer Science and Engineering, Beihang University, Beijing 100191,China;
    2. Beijing Key Laboratory of Digital Media, Beihang University, Beijing 100191,China;
    3. INF of Baidu Inc., Beijing 100085, China;
    4. China Unicom Beijing Branch, Beijing 100038, China
  • Received:2013-01-31 Online:2013-05-01 Published:2013-05-01

Abstract: With the development of P2P technology, tradition methods based on application port number and matching protocol-specific signatures in payload cannot provide acceptable accuracy any more. In this paper, a content redistribution model of P2P network was proposed. Based on this redistribution model, an identification algorithm was also developed. The proposed model is based on the underlying characteristics of P2P protocol, each peer acting both as a server and a client, so redistributing the received content to other peers. Theoretical analysis and experiments show that the approach is more suitable for identifying traffic that is generated by P2P streaming and highly sought-after resource sharing.

Key words: computer application, P2P, traffic identification, flow characteristic, content redistribution

CLC Number: 

  • TP393
[1] 鲁刚, 张宏莉, 叶麟. P2P 流量识别[J]. 软件学报, 2011, 22(6):1281-1298. Lu Gang, Zhang Hong-li, Ye Lin. P2P Traffic identification[J]. Journal of Software, 2011, 22(6): 1281-1298.

[2] Bleul H, Rathgeb E P, Zilling S. Advanced P2P multiprotocol traffic analysis based on application level signature detection//Telecommunications Network Strategy and Planning Symposium, New Delhi, India, 2006, 11: 1-6.

[3] Aceto G, Dainotti A, de Donato W, et al. PortLoad: taking the best of two worlds in traffic classification//INFOCOM IEEE Conference on Computer Communications Workshops, San Diego, IEEE Press, 2010, 3: 1-5.

[4] Smith R, Estan C, Jha S, Kong S. Deflating the big bang: Fast and scalable deep packet inspection with extended finite automata//Proceeding of the ACM SIGCOMM 2008 Conference on Data Communication, New York, ACM Press, 2008, 38(4): 207-218.

[5] Xu K, Zhang M, Ye M J, et al. Identify P2P traffic by inspecting data transfer behavior[J]. Journal of Computer Communications, 2010, 33(10): 1141-1150.

[6] Sen S, Spatscheck O, Wang D. Accurate, scalable in-network identification of P2P traffic using application signatures//Proceedings of the 13th International Conference on World Wide Web, New York, 2004:512-521.

[7] Constantinou F, Mavrommatis P. Identifying known and unknown peer-to-peer traffic//Fifth IEEE International Symposium on Network Computing and Applications, New York, IEEE Computer Society, 2006, 7: 93-102.

[8] Yang A, Jiang S, Deng H. A P2P network traffic classification method using SVM//The 9th International Conference for Young Computer Scientists, Hunan, China 2008,11:398-403.

[9] Este A, Gringoli F, Salgarelli L. On the stability of the information carried by traffic flow features at the packet level..http://ccr.sigcomm.org/online/files/p13-v39n3b4-esteA.pdf.

[10] Basher N,Mahanti A,Williamson C,et al.A comparative analysis of Web and peer-to-peer traffic//Proceedings of the 17th International Conference on World Wide Web, New York, 2008:287-296.

[11] 孙知信, 张玉峰. 基于多维支持向量机的P2P 网络流量识别模型[J].吉林大学学报:工学版,2010,40(5): 1298-1302. Sun Zhi-xin, Zhang Yu-feng. P2P network traffic identif ication model based on MSVM[J]. Journal of Jilin University (Engineering and Technology Edition), 2010, 40(5): 1298-1302.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LIU Song-shan, WANG Qing-nian, WANG Wei-hua, LIN Xin. Influence of inertial mass on damping and amplitude-frequency characteristic of regenerative suspension[J]. 吉林大学学报(工学版), 2013, 43(03): 557 -563 .
[2] CHU Liang, WANG Yan-bo, QI Fu-wei, ZHANG Yong-sheng. Control method of inlet valves for brake pressure fine regulation[J]. 吉林大学学报(工学版), 2013, 43(03): 564 -570 .
[3] LI Jing, WANG Zi-han, YU Chun-xian, HAN Zuo-yue, SUN Bo-hua. Design of control system to follow vehicle state with HIL test beach[J]. 吉林大学学报(工学版), 2013, 43(03): 577 -583 .
[4] HU Xing-jun, LI Teng-fei, WANG Jing-yu, YANG Bo, GUO Peng, LIAO Lei. Numerical simulation of the influence of rear-end panels on the wake flow field of a heavy-duty truck[J]. 吉林大学学报(工学版), 2013, 43(03): 595 -601 .
[5] WANG Tong-jian, CHEN Jin-shi, ZHAO Feng, ZHAO Qing-bo, LIU Xin-hui, YUAN Hua-shan. Mechanical-hydraulic co-simulation and experiment of full hydraulic steering systems[J]. 吉林大学学报(工学版), 2013, 43(03): 607 -612 .
[6] ZHANG Chun-qin, JIANG Gui-yan, WU Zheng-yan. Factors influencing motor vehicle travel departure time choice behavior[J]. 吉林大学学报(工学版), 2013, 43(03): 626 -632 .
[7] MA Wan-jing, XIE Han-zhou. Integrated control of main-signal and pre-signal on approach of intersection with double stop line[J]. 吉林大学学报(工学版), 2013, 43(03): 633 -639 .
[8] YU De-xin, TONG Qian, YANG Zhao-sheng, GAO Peng. Forecast model of emergency traffic evacuation time under major disaster[J]. 吉林大学学报(工学版), 2013, 43(03): 654 -658 .
[9] XIAO Yun, LEI Jun-qing, ZHANG Kun, LI Zhong-san. Fatigue stiffness degradation of prestressed concrete beam under multilevel amplitude cycle loading[J]. 吉林大学学报(工学版), 2013, 43(03): 665 -670 .
[10] XIAO Rui, DENG Zong-cai, LAN Ming-zhang, SHEN Chen-liang. Experiment research on proportions of reactive powder concrete without silica fume[J]. 吉林大学学报(工学版), 2013, 43(03): 671 -676 .