2009 International Conference on Information Technology and Computer Science 2009
DOI: 10.1109/itcs.2009.298
View full text |Buy / Rent full text
|
Sign up to set email alerts
|

Abstract: Increasing amount of P2P services not only consuming a lot of bandwidth but also influencing the performance of other business. In order to identify and control P2P flow better, this paper introduced the common methods of P2P traffic identification and proposed a high efficient method to identify P2P traffic which based on both Payload character in application layer and flow characteristics in transport layer, and then introduced some p2p flow characteristics which summed as formula, introduce system flow-char… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2011
2011
2011
2011

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 2 publications
(3 reference statements)
0
5
0
Order By: Relevance
“…The chief objection to these methods payload-based is that, it may involve confidentiality or privacy issues; for this reason, there is social controversy. Cross-layer identification techniques in Chunzhi et al (2009) are widely used in business, which combines payload feature and flow characteristics detection to avoid narrow conclusion. However, largescale flow detection is lack of practicability and it needs further research.…”
Section: Introductionmentioning
confidence: 99%
“…The chief objection to these methods payload-based is that, it may involve confidentiality or privacy issues; for this reason, there is social controversy. Cross-layer identification techniques in Chunzhi et al (2009) are widely used in business, which combines payload feature and flow characteristics detection to avoid narrow conclusion. However, largescale flow detection is lack of practicability and it needs further research.…”
Section: Introductionmentioning
confidence: 99%
“…However, the classification accuracy is improved by using both DPI and DFI methods whereas only DFI was used in the paper proposed by Erman et al [6]. The proposed system first uses DPI then DFI to classify packets which is different than the paper proposed by Wang et al [12]. With the proper ordering of DPI and DFI, the simulation results show that the running execution time is improved.…”
Section: Proposed Systemmentioning
confidence: 91%
“…There are some other papers tried to combine more than one technique mentioned above to solve the P2P classification problem. The examples would be the papers written by Chen et al [2] and Wang et al [12]. Both papers claim that their combined approach is better than the tradition approaches.…”
Section: Combined Traditional Methods Approachmentioning
confidence: 99%
See 2 more Smart Citations