Have a personal or library account? Click to login
P2P Traffic Identification Based on Host and Flow Behaviour Characteristics Cover

P2P Traffic Identification Based on Host and Flow Behaviour Characteristics

Open Access
|Sep 2013

References

  1. 1. Mac Manus, R. Trend Watch: P2P Traffic Much Bigger than Web Traffic, 2006. http://www.readwriteweb.com/archives/p2p_growth_trend_watch.php
  2. 2. Moore, A., D. Zuev. Internet Traffic Classification Using Bayesian Analysis Techniques. - In: Proceedings of 26th ACM International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2005, 2005, 50-59.10.1145/1064212.1064220
  3. 3. Sen, S., O. Spatscheck, D. Wang Accurate. Scalable in-Network Identification of P2P Traffic Using Application Signatures. - In: Proceedings of 13th World Wide Web Conference 2004, 512-520.10.1145/988672.988742
  4. 4. Nguyen, T. T., G. Armitage. A Survey of Techniques for Internet Traffic Classification Using Machine Learning. - IEEE Communications Surveys and Tutorials, Vol. 10, 2008, No 4, 56- 76.10.1109/SURV.2008.080406
  5. 5. Crotti, M., M. Dusi, F. Gringoli, L. Salgarelli. Traffic Classification through Simple Statistical Fingerprinting. - ACM SIGCOMM Computer Communication Review, Vol. 37, 2007, No 1, 7-16.10.1145/1198255.1198257
  6. 6. Bernaille, L., R. Teixeira, K. Salamatian. Traffic Classification on the Fly. - ACM SIGCOMM Computer Communication Review,Vol. 36, 2006, No 2, 23-26.10.1145/1129582.1129589
  7. 7. Chen, M., X. Wei. Hidden Markov Model-Based P2P Flow Identification: A Hidden Markov Model-Based P2P Flow Identification Method. - IET Communications, Vol. 6, 2012, No 13, 2091-2098.10.1049/iet-com.2010.1091
  8. 8. Karagiannis, T., K. Papagiannaki, M. Faloutsos. BLINC: Multilevel Traffic Classification in the Dark. - In: Proceedings of the ACM SIGCOMM 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2005, 229-237. 9 . Collins, M., M. Reiter. Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviours. - In: Proceedings of 11th European Symposium on Research in Computer Security, ESORICS 2006, 1-17.10.1145/1080091.1080119
  9. 10. Hu , Yan, Dah-Ming Chiu, John C. S. Lui. Profiling and Identification of P2P Traffic. - Computer Networks, Vol. 53, 2009, No 6, 849-863.10.1016/j.comnet.2008.11.005
  10. 11. Perenyi, M., D. Trang Dinh, A. Gefferth, S. Molnar. Identification and Analysis of Peer-to-Peer Traffic. - Journal of Communications, Vol. 1, 2006, No 7, 36-46.10.4304/jcm.1.7.36-46
  11. 12. Bermolen, P., M. Mellia, M. Meo, D. Rossi, S. Valenti. Abacus: Accurate Behavioural Classification of P2P-TV Traffic. - Computer Networks, Vol. 55, 2011, No 6, 1394-1411.10.1016/j.comnet.2010.12.004
  12. 13. Yang, Jie, Lun Yuan, Yang He, Lu-ying Chen. Timely Traffic Identification on P2P Streaming Media. - Journal of China Universities of Posts and Telecommunications, Vol. 19, 2012, No 2, 67-73.10.1016/S1005-8885(11)60247-1
  13. 14. Xu, Ke, Ming Zhang, Mingjiang Ye, Dah Ming Chiu, Jianping Wu. Identify P2P Traffic by Inspecting Data Transfer Behaviour. - Computer Communications, Vol. 33, 2010, No 10, 1141-1150.10.1016/j.comcom.2010.01.005
  14. 15. Unibs Dataset. http://www.ing.unibs.it/ntw/tools/traces/
DOI: https://doi.org/10.2478/cait-2013-0026 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 64 - 76
Published on: Sep 20, 2013
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2013 Jinghua Yan, Zhigang Wu, Hao Luo, Shuzhuang Zhang, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons License.