An intrusion detection based approach for the scalable detection of P2P traffic in the national academic network backbone

2006-06-18
The share of peer-to-peer (P2P) protocol in the total network traffic grows day-by-day in the Turkish Academic Network (UlakNet) similar to the other networks in the world. This growth is mostly because of the popularity of the shared content and the great enhancement in the P2P protocol since it first came out with Napster. The shared files are generally both large and copyrighted. Motivated by the problems of UlakNet with the P2P traffic, we propose a novel method for P2P traffic detection in the network backbone in this paper. Observing the similarity between detecting traffic that belongs to a specific protocol and detecting an intrusion in a computer system, we adopt an intrusion detection system (IDS) technique to detect P2P traffic. Our method is a passive detection procedure that uses traffic flows gathered from border routers. Hence, it is scalable and does not have the problems of other approaches that rely on packet payload data or transport layer ports.

Suggestions

A novel method for the detection of P2P traffic in the network backbone inspired by intrusion detection systems
Soysal, Murat; Schmidt, Şenan Ece; Department of Electrical and Electronics Engineering (2006)
The share of peer-to-peer (P2P) protocol in the total network traffic grows dayby- day in the Turkish Academic Network (UlakNet) similar to the other networks in the world. This growth is mostly because of the popularity of the shared content and the great enhancement in the P2P protocol since it first came out with Napster. The shared files are generally both large and copyrighted. Motivated by the problems of UlakNet with the P2P traffic, we propose a novel method for P2P traffic detection in the network ...
An accurate evaluation of machine learning algorithms for flow-based P2P traffic detection
Soysal, Murat; Schmidt, Şenan Ece (2007-12-01)
Today, peer-to-peer (P2P) traffic consumes the largest fraction of network bandwidth. The files shared by P2P communications are mostly copyright protected, and there are issues related to Quality of Service (QoS) support and billing of P2P traffic. Hence, scalable and accurate detection of peer-to-peer (P2P) traffic is a significant problem for network service providers. Flow-based detection methods employ characteristics of data flows such as the number of packets per flow to classify P2P and non-P2P traf...
An IP multicast handoff scheme with focus on IGMP sourced latency
Baykal, Buyurman; Akan, OB (2002-07-05)
This paper focuses on the latency due to IGMP during inter-subnet handoffs in Mobile IP multicast networks and proposes a new method for this purpose. Pre-informing the neighbor subnets about the expected mobile hosts under the shadow cluster concept and triggering the preparation phase in advance are the fundamentals of the proposal. Performance improvement achieved through the method is discussed in the paper with the particular emphasis on QoS critical applications.
The road to dynamic Future Internet via content characterization
Al-Turjman, Fadi; GÜNAY, MELİH; Kucukoglu, Irem (2017-04-01)
The Internet evolved from a network with a few terminals to an intractable network of millions of nodes. Recent interest in information-centric networks (ICNs) is gaining significant momentum as a Future Internet paradigm. The key question is, hence, how to model the massive amount of connected nodes with their content requests in dynamic paradigm. In this paper, we present a novel method to characterize data requests based on content demand ellipse (CDE), focusing on efficient content access and distributi...
A new scalable service discipline for real-time traffic: The framed-deadline scheduler
Schmidt, Şenan Ece (Elsevier BV, 2007-03-26)
Qulaity of Service (Qos) support in a scalable and low-complexity fashion is important in high-speed networks carrying real-time traffic. There are service disciplines that can provide end-to-end bandwidth and delay guarantees. However, they are designed to operate with expensive output quenching switches or with combined input-output queuing (CIOQ) switches that require very complicated fabric work with a CIOQ packet switch to provide the same end-to-end QoS guarantees as service disciplines that only work...
Citation Formats
Ş. E. Schmidt, “An intrusion detection based approach for the scalable detection of P2P traffic in the national academic network backbone,” 2006, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/54529.