DocumentCode :
1772394
Title :
Classifying peer-to-peer traffic using protocol hierarchy
Author :
Puangpronpitag, Somnuk ; Chuachan, Thongchai ; Pawara, Pornntiwa
Author_Institution :
Fac. of Inf., Mahasarakham Univ., Mahasarakham, Thailand
fYear :
2014
fDate :
3-5 June 2014
Firstpage :
1
Lastpage :
6
Abstract :
Detection and classification of peer-to-peer traffic are still difficult tasks for bandwidth shapers. First, peer-to-peer traffic is not easy to detect, and can be a serious problem. Second, some peer-to-peer applications may be desirable, while some may be undesirable. Hence, different peer-to-peer applications should also be treated differently. The previous work of peer-to-peer traffic detection still faces both problems. So, in this paper, we propose new classification mechanisms to solve the problems. Our proposed solution has been implemented by using JAVA, and experimented on a network test-bed. Experimental results have demonstrated that our extended classification mechanism can improve the peer-to-peer traffic detection and classification.
Keywords :
Java; bandwidth allocation; cryptographic protocols; pattern classification; peer-to-peer computing; telecommunication traffic; JAVA; bandwidth shaper; classification mechanism; network test-bed; peer-to-peer traffic classification; peer-to-peer traffic detection; protocol hierarchy; Accuracy; Bandwidth; Cryptography; Peer-to-peer computing; Ports (Computers); Protocols; TV; Peer-to-peer traffic; bandwidth shaper; encrypted peer-to-peer traffic classification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer and Information Sciences (ICCOINS), 2014 International Conference on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4799-4391-3
Type :
conf
DOI :
10.1109/ICCOINS.2014.6868391
Filename :
6868391
Link To Document :
بازگشت