Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation 2015
DOI: 10.1145/2739482.2768432
|View full text |Cite
|
Sign up to set email alerts
|

A Preliminary Investigation on the Identification of Peer to Peer Network Applications

Abstract: Identification of P2P (peer to peer) applications inside network traffic plays an important role for route provisioning, traffic policing, flow prioritization, network service pricing, network capacity planning and network resource management. Inspecting and identifying the P2P applications is one of the most important tasks to have a network that runs efficiently. In this paper, we focus on identification of different P2P applications. To this end, we explore four commonly used supervised machine learning alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Hence, it would lead to many miss-classifications, due to which a high detection rate may not be achieved. Bozdogan et al [13] assessed four supervised and one un-supervised ML algorithms, namely SVM, C4.5 decision tree, Ripper, Naïve Bayesian, and K-means, respectively, for the identification of P2P network applications. They found that Ripper and C4.5 algorithms have a similar performance with the detection rate ranging between 58.9-99.1% and 15.6-98.1%, respectively.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, it would lead to many miss-classifications, due to which a high detection rate may not be achieved. Bozdogan et al [13] assessed four supervised and one un-supervised ML algorithms, namely SVM, C4.5 decision tree, Ripper, Naïve Bayesian, and K-means, respectively, for the identification of P2P network applications. They found that Ripper and C4.5 algorithms have a similar performance with the detection rate ranging between 58.9-99.1% and 15.6-98.1%, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…goto step 17 (6) else if (flw.fh == true) (7) write: flw → P2P (8) else ( 9) { ( 10) fset = flw.ff (11) rst = flw.MLA (fset) (12) if (rst == "P2P") (13) write: flw → P2P ( 14) else (15) write: flw → non-P2P ( 16) } ( 17) flw = fetch_flow() ( 18) }while (flw ! = NULL) End…”
Section: Statistical Based Classificationmentioning
confidence: 99%
“…The experiment performed on traffic traces of P2P applications include BitTorrent, eMule, PPTV & Cbox and achieved true positive rate ranging from 95.4 to 98.63 % and false positive rate of 0.01 %. Bozdogan et al [92] evaluated the performance of machine learning algorithms for classification of P2P applications, which include BitCommet, uTorrent and BitTorrent. Four supervised algorithms (C4.5, Ripper, SVM and Naive Bayes) and one un-supervised algorithm (K-means) were evaluated using the metrics: detection rate, false positive rate, f-measure and correctly classification rate.…”
Section: Classification Of Traffic In the Darkmentioning
confidence: 99%