Fifth International Conference on Intelligent Control and Information Processing 2014
DOI: 10.1109/icicip.2014.7010349
|View full text |Cite
|
Sign up to set email alerts
|

Netflow based P2P detection in UDP traffic

Abstract: Though it is commonly assumed that Internet traffic is dominated by TCP, there has been an increasing demand for UDP based P2P applications. UDP is widely used in new P2P networks because it can provides better support for NAT traversal. Since many of these applications use private protocols, UDP traffic is often hard to analyze, especially if the available data is only netflow records. In this paper, a component based method is proposed to analyze UDP traffic. Since flows in each component share the same appl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Further the model can be employed for real-time identification of traffic. Zhang et al [67] proposed component based method to detect P2P traffic utilizing UDP for communication. In graph theory, component is defined as connected sub-graphs from a disjoint graph.…”
Section: Classification Of Traffic In the Darkmentioning
confidence: 99%
“…Further the model can be employed for real-time identification of traffic. Zhang et al [67] proposed component based method to detect P2P traffic utilizing UDP for communication. In graph theory, component is defined as connected sub-graphs from a disjoint graph.…”
Section: Classification Of Traffic In the Darkmentioning
confidence: 99%
“…The experimental results achieved precision values ranging between 90.96-93.66% and recall values ranging between 86.69-95.73% in identifying PPTV, Skype, and Thunder. Zhang et al [35] proposed the component-based technique (i.e., based on the graph theory) to analyze various P2P applications which use the UDP protocol for communication. They argue that component-level statistics can be used to detect P2P traffic reliably and accurately.…”
Section: Classification In the Darkmentioning
confidence: 99%