Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
An intrusion detection based approach for the scalable detection of P2P traffic in the national academic network backbone
Date
2006-06-18
Author
Schmidt, Şenan Ece
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
163
views
0
downloads
Cite This
The share of peer-to-peer (P2P) protocol in the total network traffic grows day-by-day in the Turkish Academic Network (UlakNet) similar to the other networks in the world. This growth is mostly because of the popularity of the shared content and the great enhancement in the P2P protocol since it first came out with Napster. The shared files are generally both large and copyrighted. Motivated by the problems of UlakNet with the P2P traffic, we propose a novel method for P2P traffic detection in the network backbone in this paper. Observing the similarity between detecting traffic that belongs to a specific protocol and detecting an intrusion in a computer system, we adopt an intrusion detection system (IDS) technique to detect P2P traffic. Our method is a passive detection procedure that uses traffic flows gathered from border routers. Hence, it is scalable and does not have the problems of other approaches that rely on packet payload data or transport layer ports.
Subject Keywords
Bayesian networks
,
Peer-to-peer
,
P2P
,
Intrusion detection systems
,
Traffic characterization
URI
https://hdl.handle.net/11511/54529
Collections
Department of Electrical and Electronics Engineering, Conference / Seminar
Suggestions
OpenMETU
Core
A novel method for the detection of P2P traffic in the network backbone inspired by intrusion detection systems
Soysal, Murat; Schmidt, Şenan Ece; Department of Electrical and Electronics Engineering (2006)
The share of peer-to-peer (P2P) protocol in the total network traffic grows dayby- day in the Turkish Academic Network (UlakNet) similar to the other networks in the world. This growth is mostly because of the popularity of the shared content and the great enhancement in the P2P protocol since it first came out with Napster. The shared files are generally both large and copyrighted. Motivated by the problems of UlakNet with the P2P traffic, we propose a novel method for P2P traffic detection in the network ...
An accurate evaluation of machine learning algorithms for flow-based P2P traffic detection
Soysal, Murat; Schmidt, Şenan Ece (2007-12-01)
Today, peer-to-peer (P2P) traffic consumes the largest fraction of network bandwidth. The files shared by P2P communications are mostly copyright protected, and there are issues related to Quality of Service (QoS) support and billing of P2P traffic. Hence, scalable and accurate detection of peer-to-peer (P2P) traffic is a significant problem for network service providers. Flow-based detection methods employ characteristics of data flows such as the number of packets per flow to classify P2P and non-P2P traf...
An IP multicast handoff scheme with focus on IGMP sourced latency
Baykal, Buyurman; Akan, OB (2002-07-05)
This paper focuses on the latency due to IGMP during inter-subnet handoffs in Mobile IP multicast networks and proposes a new method for this purpose. Pre-informing the neighbor subnets about the expected mobile hosts under the shadow cluster concept and triggering the preparation phase in advance are the fundamentals of the proposal. Performance improvement achieved through the method is discussed in the paper with the particular emphasis on QoS critical applications.
The road to dynamic Future Internet via content characterization
Al-Turjman, Fadi; GÜNAY, MELİH; Kucukoglu, Irem (2017-04-01)
The Internet evolved from a network with a few terminals to an intractable network of millions of nodes. Recent interest in information-centric networks (ICNs) is gaining significant momentum as a Future Internet paradigm. The key question is, hence, how to model the massive amount of connected nodes with their content requests in dynamic paradigm. In this paper, we present a novel method to characterize data requests based on content demand ellipse (CDE), focusing on efficient content access and distributi...
A new scalable service discipline for real-time traffic: The framed-deadline scheduler
Schmidt, Şenan Ece (Elsevier BV, 2007-03-26)
Qulaity of Service (Qos) support in a scalable and low-complexity fashion is important in high-speed networks carrying real-time traffic. There are service disciplines that can provide end-to-end bandwidth and delay guarantees. However, they are designed to operate with expensive output quenching switches or with combined input-output queuing (CIOQ) switches that require very complicated fabric work with a CIOQ packet switch to provide the same end-to-end QoS guarantees as service disciplines that only work...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
Ş. E. Schmidt, “An intrusion detection based approach for the scalable detection of P2P traffic in the national academic network backbone,” 2006, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/54529.