2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2013
DOI: 10.1109/imis.2013.31
|View full text |Cite
|
Sign up to set email alerts
|

Two-Step P2P Traffic Classification with Connection Heuristics

Abstract: The basis of P2P traffic control is to classify P2P traffic accurately. Several methods such as port-based, signature-based, pattern-based and statistics-based method have been proposed for P2P traffic classification. However, as P2P applications have tried to avoid being easily detected, it becomes hard to classify P2P traffic accurately using only one method. In this paper, we propose an improved two-step P2P traffic classifier by combining signature-based classifier with connection heuristics in packet-leve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Table 5 shows the summary regarding the approach used in the first and second step classification process along with the classification accuracy of various existing hybrid P2P traffic classification techniques. During the classification process, the techniques used in [5,[19][20][21]52,55], rely on the signature-based approach, which is computationally expensive [6,30,31] and has various other limitations as discussed in Section 2. In addition, the techniques in [19][20][21] do not classify the UDP traffic.…”
Section: Datasets Validation and Experimental Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Table 5 shows the summary regarding the approach used in the first and second step classification process along with the classification accuracy of various existing hybrid P2P traffic classification techniques. During the classification process, the techniques used in [5,[19][20][21]52,55], rely on the signature-based approach, which is computationally expensive [6,30,31] and has various other limitations as discussed in Section 2. In addition, the techniques in [19][20][21] do not classify the UDP traffic.…”
Section: Datasets Validation and Experimental Resultsmentioning
confidence: 99%
“…During the classification process, the techniques used in [5,[19][20][21]52,55], rely on the signature-based approach, which is computationally expensive [6,30,31] and has various other limitations as discussed in Section 2. In addition, the techniques in [19][20][21] do not classify the UDP traffic. The technique used in [53] relies on dedicated hardware for the P2P classification, whereas the technique used in [22] may lead to many false negatives since during the classification process, it filters out all the traffic using well-known port numbers (such as 20, 21, 443, etc.)…”
Section: Datasets Validation and Experimental Resultsmentioning
confidence: 99%
See 1 more Smart Citation