Paper Title:
A P2P Protocol Identification Algorithm Based on PSO-SVM
  Abstract

The growing of P2P applications enriched the resources sharing by network, but it also brought many problems such as occupying network bandwidth, security of personal information. Therefore, the monitor of P2P applications is very important, and P2P protocol identification is the key point. So far since the P2P appeared, new P2P applications and data encryption made the traditional port-based and application layer protocol signature recognition useless. To overcome the shortcomings of current methods, a new P2P identification algorithm is proposed which uses DFI (Deep Flow Inspection) by extracting the various properties of P2P data stream characteristics, and then the data flows are divided into TCP and UDP data sets, finally the support vector machine optimized by particle swarm optimization is used to assort the network data streams, Experimental results of the P2P and non-P2P applications show that this algorithm can identify the HTTP applications 100% and for a variety of P2P applications, the accuracy of classification can also reach to 95%.

  Info
Periodical
Key Engineering Materials (Volumes 467-469)
Edited by
Dehuai Zeng
Pages
1528-1534
DOI
10.4028/www.scientific.net/KEM.467-469.1528
Citation
L. Mao, X. S. Chen, Z. G. Wu, "A P2P Protocol Identification Algorithm Based on PSO-SVM", Key Engineering Materials, Vols. 467-469, pp. 1528-1534, 2011
Online since
February 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Jun Kang
Abstract:The Quality of performance of Networked control system (NCS) depends on the quality of network service. To guarantee the limit of quality of...
228
Authors: Yong Xiang Zhao, Qian Hu, Chang Jia Chen
Abstract:Data center has become a major infrastructure of Internet application in recent years. Tradition TCP is not suitable to carry the traffic in...
2360
Authors: Xia Li, Sheng Xun Wang
Chapter 20: The Internet of Things
Abstract:This article gives the outline of the method of TCP measurement, and the open source codes are combined to make the active measurement for...
3020
Authors: Hai Feng Guo
Chapter 4: Sensors, Measurement, Monitoring and Detection
Abstract:Proposed a way to UPD flow and UPD system ideology. The system is considered the one-way characteristics of UDP flow in the backbone of the...
946
Authors: Jin Hai Zhang
Chapter 3: Network and Computer Technology. Applied Methods of Computing
Abstract:With the development of the information industry, awareness of information resources has gradually transition from text and images to audio...
160