DocumentCode :
1799847
Title :
Identifying P2P Network Activities on Encrypted Traffic
Author :
Xiaolei Wang ; Yuexiang Yang ; Jie He
Author_Institution :
Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
fYear :
2014
fDate :
24-26 Sept. 2014
Firstpage :
893
Lastpage :
899
Abstract :
Peer-to-Peer (P2P) traffic has always been a dominant portion of current Internet traffic and become more and more difficult to manage for Internet Service Producers (ISP) and network administrators. Although many methods have been proposed to classify different types of P2P applications and achieved satisfied performance, research on identifying network activities of a certain P2P application is still lacking to the best of our knowledge, which is urgently required in the context of forensic investigation for illegal P2P applications. In this paper, a novel approach based on Hidden Markov Model is proposed to identify network activities on the encrypted traffic, based on analysis of the time series characteristics and statistical properties of network traffic. After presenting a general model of network activities, Team Viewer is selected as a case study to verify the effectiveness of the approach to identify different activities. According to experiments using real network traces, our approach proves to be effective in identifying different activities of a P2P application with a high true positive 99.1% and low negligible false positive 3.6%.
Keywords :
Internet; computer network security; cryptography; hidden Markov models; peer-to-peer computing; telecommunication traffic; time series; ISP; Internet service producers; Internet traffic; P2P network activities identification; P2P traffic; TeamViewer; encrypted traffic; forensic investigation context; hidden Markov model; illegal P2P applications; peer-to-peer traffic; statistical properties; time series characteristics; Analytical models; Computational modeling; Cryptography; Hidden Markov models; Probability; Time series analysis; Training; Baum-Welch algorithm; Hidden Markov Model (HMM); Peer-to-Peer; TeamViewer; Viterbi algorithm; statistical properties; time series characteristics;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on
Conference_Location :
Beijing
Type :
conf
DOI :
10.1109/TrustCom.2014.117
Filename :
7011343
Link To Document :
بازگشت