The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet Service Providers (ISPs) are in a constant race to meet the bandwidth demands of their subscribers. Access link upgrades, however, are expensive and take years to deploy. Many ISPs are looking for alternative solutions to reduce the need for continuous and expensive infrastructure expansion. This paper shows that there are many forms of local connectivity and storage in residential environments,...
When a content provider (CP) provides peer-to-peer live streaming service, routing decisions based on the knowledge of underlay traffic could lead to much better performance (such as user delay). On the other hand, if the Internet Service Providers (ISPs) provide underlay traffic information to the CP, their overall network cost due to routing inefficiencies could be reduced. There is hence incentive...
Thunder (also called Xunlei) is the most popular P2P file sharing application in China and probably the most popular P2P software in term of traffic volume and number of users. Precisely identifying Thunder traffic can help network administrators to efficiently manage their networks. Traditional methods of identifying P2P traffic such as port-based or content-based approaches are ineffective to Thunder...
Traffic locality is a promising way for P2P systems to reduce cross-network traffic and improve performance. For the specific application, eMule, there are few reports on traffic locality in eMule to date. In this paper, we study how to integrate traffic locality mechanism into the eMule system. The eMule protocol is summarized and the source code of the eMule software is analyzed. Then traffic locality...
In Peer-to-Peer (P2P) networks a malicious peer can control the direction of the traffic after it controls lots of bots. This paper focus on defending Distributed Denial of Service (DDoS) attack in P2P networks by selecting the most active peer with its credit values which is recorded in a period of Credit Construction time. The Credit values can be updated in the lest period. We propose Scheduler...
This paper proposes BotDigger, a fuzzy logic-based botnet detection system. In this system, we derive a set of logical rules based on a well known botnet characteristics. Utilizing these rules, an adaptive logic algorithm will be applied on network traffic traces searching for botnet footprints and associating a trust level for each host present in the sampled data. Future work will focus on evaluating...
The paper presents a concept of the peer-to-peer related traffic optimization. The mechanism is based on the Oracle idea, where a peer is informed on closely located P2P nodes suggesting connection to them. The Oracle gains the relevant information on the basis of BGP databases, where the important extension is related to using a cooperation mechanism between different operators' domains.
More and more applications are adopting peer-to-peer (P2P) technology. Skype is a P2P based, popular VoIP software. The software works almost seamlessly across Network Address Translations (NATs) and firewalls and has better voice quality than most IM applications. The communication protocol and source code of Skype are undisclosed. It uses high strength encryption and random port number selection,...
BitTorrent(BT)-like P2P traffic which occupy main network bandwidth affect other normal network applications badly. This paper presents a triggered dynamic mechanism for BT-like P2P bandwidth management. According to the variety of utilization percentage of egress router input/output cache, this mechanism could estimate the potential network congestion and be triggered to control the BT-like P2P bandwidth...
Service discovery in Ubiquitous Sensor Networks has been targeted mostly for services available within certain proximity, but the service availability only in close vicinity is no longer feasible in the pervasive and ubiquitous era. In order to address the ubiquity in service discovery, we have proposed a framework that makes use of the Electronic Number Mapping (ENUM) protocol. Our network architecture...
Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, we discover and study address-misconfigured P2P traffic, a major class of such misconfiguration. P2P address misconfiguration is a phenomenon in which a large number of peers send P2P file downloading requests to a ``random'' target on the...
In recent years, a lot of terminal mobility support schemes have been proposed. These schemes mainly focus on providing seamless mobility by reducing the handover delay. They work well when the handover takes place between two overlapping wireless networks. However, in some worst scenario, it is possible that a mobile node (MN) becomes disconnected from the network for some time before it can join...
The current Internet traffics depend more on the P2P type communication than the legacy client-server type communication. The P2P communication has been applied to diverse systems such as the VoIP and the file sharing system for the P2P potential ability. The distributed file sharing system over the P2P network using DHT (distributed hash table) can especially provide the quick search, while the file...
Identifying application types in network traffic is a difficult problem for administrators who must secure and manage network resources, further complicated by the use of encrypted protocols and nonstandard port numbers. This paper takes a unique approach to this problem by modeling and analyzing application graphs, structures which describe the application-level (e.g., HTTP, FTP) communications between...
The increasing popularity and success of web-based peer-to-peer (P2P) systems for streaming video applications make them likely candidates for injecting large volumes of traffic in the emerging WiMAX networks. This paper develops a lightweight mechanism for P2P streaming in WiMAX networks that significantly reduces the load on the network and improves the scalability of the streaming system. The proposed...
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of conference participants using multicast algorithms that minimize the amount of traffic sent over the network. This is far more effective than systems that maintain a separate link between each participant. On the other hand Peer-to-Peer...
Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the performance of enterprise critical networked applications or network-based tasks or may overload the network infrastructure of Internet service providers, being desirable that this traffic be blocked in some situations. However,...
The Session Initiation Protocol (SIP) implements methods for generic service discovery and versatile messaging. It is, therefore, expected to be a key component in many telecommunication and Internet services. For example, the 3GPP IP Multimedia Subsystem relies heavily on SIP. Given its critical role, ensuring the security of SIP is clearly a crucial task. In this paper, we analyze the SIP protocol...
Today, most P2P applications do not consider locality on the underlying network topology when choosing their neighbors on the P2P routing layer. As a result, participating peers may experience long delays and peers' ISPs suffer from a large amount of (costly) inter-ISP traffic. One potential solution to mitigate these problems is to have ISPs or third parties convey information regarding the underlying...
In recent years peer-to-peer (P2P) systems gain much attention. Growing popularity in P2P based protocol implementations for file sharing purposes caused that the P2P traffic exceeds Web traffic, once of the dominant traffic on the Internet. In fact of that, the use of P2P systems introduce many new problems related to traffic engineering or network optimization. In accordance to our previous works...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.