Title :
An accurate evaluation of machine learning algorithms for flow-based P2P traffic detection
Author :
Soysal, Murat ; Schmidt, Ece G.
Author_Institution :
Turkish Acad. Network & Inf. Center, Ankara
Abstract :
Today, peer-to-peer (P2P) traffic consumes the largest fraction of network bandwidth. The files shared by P2P communications are mostly copyright protected, and there are issues related to Quality of Service (QoS) support and billing of P2P traffic. Hence, scalable and accurate detection of peer-to-peer (P2P) traffic is a significant problem for network service providers. Flow-based detection methods employ characteristics of data flows such as the number of packets per flow to classify P2P and non-P2P traffic. Thus, they provide solutions to problems of port-based and signature-based detection such as P2P applications with dynamic ports, updating the signature database and encrypted packets. In this paper, a comparative evaluation of several flow-based P2P traffic detection methods that employ machine learning (ML) techniques is presented. Different from previous work, the effect of network parameters is taken into consideration in our evaluation. Furthermore a new verification approach based on custom-made data is presented which can circumvent the accuracy problems of the previous verification methods that use port-based or signature-based techniques for the accuracy evaluation.
Keywords :
copy protection; copyright; cryptography; digital signatures; learning (artificial intelligence); peer-to-peer computing; quality of service; telecommunication traffic; P2P communications; copyright protected; data flows; encrypted packets; flow-based P2P traffic detection; flow-based detection methods; machine learning algorithms; machine learning techniques; network bandwidth; network service providers; peer-to-peer traffic; quality of service support; signature database; signature-based detection; verification methods; Bandwidth; Cryptography; Databases; Machine learning; Machine learning algorithms; Payloads; Peer to peer computing; Protection; Quality of service; Telecommunication traffic;
Conference_Titel :
Computer and information sciences, 2007. iscis 2007. 22nd international symposium on
Conference_Location :
Ankara
Print_ISBN :
978-1-4244-1363-8
Electronic_ISBN :
978-1-4244-1364-5
DOI :
10.1109/ISCIS.2007.4456894