Proceedings of the 13th International Conference on World Wide Web 2004
DOI: 10.1145/988672.988742
|View full text |Cite
|
Sign up to set email alerts
|

Accurate, scalable in-network identification of p2p traffic using application signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

2
370
2
8

Year Published

2009
2009
2016
2016

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 673 publications
(382 citation statements)
references
References 12 publications
2
370
2
8
Order By: Relevance
“…As a result, port-based classification on their network was useless; at least 30-70% of all traffic would be misclassified because most P2P applications nowadays use dynamic port numbering. Studies done by Sen et al [21] and Moore et al [22] also demonstrated that port-based classification is ineffective. Sen et al examined various P2P protocols and found that three popular P2P protocols (KaZaA, Gnutella and DirectConnect) use anywhere between 35-70% of non-standard ports which could not be classified by IANA's mapping.…”
Section: Port-based Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, port-based classification on their network was useless; at least 30-70% of all traffic would be misclassified because most P2P applications nowadays use dynamic port numbering. Studies done by Sen et al [21] and Moore et al [22] also demonstrated that port-based classification is ineffective. Sen et al examined various P2P protocols and found that three popular P2P protocols (KaZaA, Gnutella and DirectConnect) use anywhere between 35-70% of non-standard ports which could not be classified by IANA's mapping.…”
Section: Port-based Classificationmentioning
confidence: 99%
“…In [21], Sen et al looked to find signatures for five popular P2P applications (Gnutella, eDonkey, DirectConnect, KaZaA and BitTorrent). Each P2P application has its own specific protocol it uses to communicate and Sen et al looked to find a signature on this protocol in the payload of a single TCP packet (most of their signatures were found in the HTTP request header).…”
Section: Deep-packet Inspectionmentioning
confidence: 99%
“…기존의 제안된 포트 기반 분류 방법 [6,7] , 페이로드 시그니쳐 분류 방법 [8,9,10] , 머신러닝 분 류 방법 [11,12] 법론을 제안한다. 본 논문에서 구축한 멀티레벨 트래 픽 분석 시스템은 헤더 시그니쳐 [13] , 통계 시그니쳐 [14] , 페이로드 시그니쳐 [9] , 행동양식 기반 알고리즘 [15] 의 따라서, IANA [6] 에 정의된 포트 정보 기반의 분류 방법을 통해 신뢰성과 정확성이 높은 트래픽 분류 결과를 도출할 수 있었다.…”
unclassified
“…본 논문에서 구축한 멀티레벨 트래 픽 분석 시스템은 헤더 시그니쳐 [13] , 통계 시그니쳐 [14] , 페이로드 시그니쳐 [9] , 행동양식 기반 알고리즘 [15] 의 따라서, IANA [6] 에 정의된 포트 정보 기반의 분류 방법을 통해 신뢰성과 정확성이 높은 트래픽 분류 결과를 도출할 수 있었다. 하지만, 현재 인터넷 트래 픽의 상당수를 차지하고 있는 P2P 프로그램을 비롯 한 많은 응용 프로그램들은 동적 포트 할당과 같은 기술들로 포트 기반 분류 방법론은 더 이상 정확하 지 않다 [10] .…”
unclassified
See 1 more Smart Citation