The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Current P2P applications use various obfuscation techniques to avoid detection, the technique of deep packet inspection (DPI) can detect the characteristics string in P2P protocols, which is regarded as a promising method for future peer-to-peer traffic identification. one prototype system of P2P traffic detection is implemented. This system adopts off-line detection method, and it can identify P2P...
Peer-to-peer (P2P) systems generate a major fraction of the current Internet traffic, and they significantly increase the load on ISP networks and the cost of running and connecting customer networks (e.g., universities and companies) to the Internet. To mitigate these negative impacts, many previous works in the literature have proposed caching of P2P traffic, but very few (if any) have considered...
Traffic locality is a promising way for P2P systems to reduce cross-network traffic and improve performance. For the specific application, eMule, there are few reports on traffic locality in eMule to date. In this paper, we study how to integrate traffic locality mechanism into the eMule system. The eMule protocol is summarized and the source code of the eMule software is analyzed. Then traffic locality...
P2P protocol is widely used in many network applications. Recently, p2p traffic reserves a big part of total access bandwidth and may cause serious problems in EPON. In this paper, a new method to identify the p2p traffic based on the flow ID (five-tuple) is presented. We analyze the factors that influence identification accuracy, and then simulate accurate rate of the new method according to the...
Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, we discover and study address-misconfigured P2P traffic, a major class of such misconfiguration. P2P address misconfiguration is a phenomenon in which a large number of peers send P2P file downloading requests to a ``random'' target on the...
Today, peer-to-peer service has become a very member of the network traffics. Thus, it broke the normal communication of the other important services through taking up their networkpsilas resource. This paper will put forward a method of P2P traffics identification on Internet based on the deep flow inspection through an analysis of the P2P protocols and models. This method can restrain the P2P bandwidth...
This paper shows the network-level view of the behaviour of two popular and deployed anonymity systems; Tor and JAP (AN.ON). The analysis uses the fact that both of them depend on TCP (transmission control protocol) and shows cases when network conditions may affect the systemspsila operations. The main topics are: on-off traffic, difference in available bandwidth between peers, and usage of the window...
Many P2P software have the similar communication patterns with computer worms, thus they will bring in false positives for behaviour based worm detection. Up to now, little work is done on the research of the similarities between communication patterns of worm and P2P software as well as how to eliminate the worm-like P2P traffic. Based on the analysis of popular P2P software used nowadays and the...
Zero-day attacks - especially those that hide the attack exploit by using code obfuscation and encryption - remain a formidable challenge to existing network defenses. Many techniques have been developed that can address known attacks and similar new attacks that may arise in the future. Some methods, like Earlybird and Polygraph, focus on string-based content prevalence in payloads; others focus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.