Transport Layer Identification of P2P Traffic

Transport Layer Identification of p2p Traffic T Karagiannis, A Broido, M. Faloutsos, K claffy
Transport Layer Identification of P2P Traffic T. Karagiannis, A. Broido, M. Faloutsos, K. Claffy

Outline ● Introduction ●Re| ated work Payload analysis Limitations Non-payload identification Experiments evaluation ●P2 P traffic trends e Conclusions
Outline • Introduction • Related work • Payload analysis & Limitations • Non-payload identification • Experiments & Evaluation • P2P traffic trends • Conclusions

Characters of p2P Traffic Traffic volume grows rapidly Frequently upgrades emergence of new protocols Disquise the traffic to circumvent firewalls legal issues Non-standard proprietary protocols(poor documented) Operate on arbitrary port numbers Support payload encryption
Characters of P2P Traffic • Traffic volume grows rapidly • Frequently upgrades & emergence of new protocols • Disguise the traffic to circumvent firewalls & legal issues – Non-standard, proprietary protocols (poorly documented) – Operate on arbitrary port numbers – Support payload encryption

Identification Methodology Examining packet payload Signature-based methodology Limitations Identifying at transport layer Based on flow patterns p2p behaviors Advantages
Identification Methodology • Examining packet payload – Signature-based methodology – Limitations • Identifying at transport layer – Based on flow patterns & P2P behaviors – Advantages

Contributions Develop a methodology for P2P traffic profiling by identifying flow patterns and behavior characteristics Evaluate the effectiveness by comparing with payload analysis Convince the growing of P2P traffic by analyzing backbone traces
Contributions • Develop a methodology for P2P traffic profiling by identifying flow patterns and behavior characteristics • Evaluate the effectiveness by comparing with payload analysis • Convince the growing of P2P traffic by analyzing backbone traces

Previous Work Detailed characterization of a small subset of P2P protocols networks Properties of topology, bandwidth, caching availability, etc Signature-based traffic identification Traffic estimation of P2P applications with fixed ports
Previous Work • Detailed characterization of a small subset of P2P protocols & networks • Properties of topology, bandwidth, caching & availability, etc. • Signature-based traffic identification • Traffic estimation of P2P applications with fixed ports

Payload Analysis Table 2: Strings at the beginning of the payload of P2P protocols. The character 0x" below implies Hex strings P2P Protocol String Trans. prot. Def. ports eDonkey20000xe319010000TCP/UDP4661-4665 0xc53f010000 Fasttrack "Get hash' TCP 1214 0x270000002980 UDP Bittorrent "Ox13bit' TCP 6881-6889 gnutella GNUT”.“GIV TCP 6346-6347 GND” UDP GO!!. MD5. SIZOx 20 TCP 41170UDP Direct connect $MyN”,"$Dir TCP41-412 SR” UDP A res "get hash: TCP Get shal
Payload Analysis

Payload Analysis M1: Flag a flow with a src/dst port number matching one of the well-known port numbers M2: Flag a flow as p2P if the 16-byte payload of any packet matches the signatures, else flag it as non-P2P A loose lower bound on P2p volume M3: Hash the (src, dst] ip pair of a flow flagged as P2P into a table. Flag the flows containing an IP address in the table as "possible P2P" even if no payload matches
Payload Analysis • M1: Flag a flow with a src/dst port number matching one of the well-known port numbers. • M2: Flag a flow as P2P if the 16-byte payload of any packet matches the signatures , else flag it as non-P2P. – A loose lower bound on P2P volume • M3: Hash the {src, dst} ip pair of a flow flagged as P2P into a table. Flag the flows containing an IP address in the table as “possible P2P” even if no payload matches

Limitations Captured payload size Only first 16 bytes of payload Only 4 bytes in older traces Http requests Encryption o Other P2P protocols o Unidirectional traces
Limitations • Captured payload size – Only first 16 bytes of payload – Only 4 bytes in older traces • HTTP requests • Encryption • Other P2P protocols • Unidirectional traces

Non-payload Identification ● Two main heuristics dsrc, dst IP pairs that use both TCP and udp to transfer data The behavior of peers by studying connection characteristics of (IP porty pairs
Non-payload Identification • Two main heuristics: – {src, dst} IP pairs that use both TCP and UDP to transfer data – The behavior of peers by studying connection characteristics of {IP, port} pairs
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 复旦大学:《数据库基础与应用》课程PPT教学课件(Access案例教程)第1章 数据库基础知识.pptx
- 香港科技大学:Advanced Topics in NextGeneration Wireless Networks.ppt
- 《编译原理》课程教学资源(PPT课件讲稿)第五章 语法分析——自下而上分析.ppt
- 香港城市大学:Introduction to Real-Time Systems(Design and Analysis of Algorithms).pptx
- 《网站设计与建设 Website design and developments》课程教学资源(PPT课件讲稿)第一部分 Web基础知识 第3章 图形与Web设计.ppt
- 《汇编语言》课程PPT教学课件:第三章 80x86寻址方式和指令系统.ppt
- 清华大学:高校信息门户建设(PPT讲稿).ppt
- 《计算机辅助设计 Computer Aided Design》课程PPT教学课件:第一篇 CAD技术 第一章 几何造型方法介绍和分类.ppt
- 西安电子科技大学:《操作系统 Operating Systems》课程教学资源(PPT课件讲稿)Chapter 02 进程和线程 Processes and Threads.ppt
- 《数字图像处理 Digital Image Processing》课程教学资源(PPT课件讲稿)第2章 图像的基本知识及运算.ppt
- 江苏海洋大学(淮海工学院):《Java面向对象程序设计》课程教学资源(PPT课件讲稿)第3章 Java 面向对象编程 3.1 面向对象软件开发概述.pptx
- 利用NetRiver实验系统实现IP协议交互和TCP协议交互.ppt
- 《软件工程简介》课程PPT教学课件(可行性研究、需求分析、总体设计、详细设计).ppt
- ARM Tachnology:Chapter 3 STM32 Clock and Configuration.ppt
- 《汇编语言程序设计》课程教学资源(PPT课件讲稿)循环与分支程序设计.ppt
- 香港科技大学:Latent Tree Models.pptx
- Network and System Security Risk Assessment(PPT讲稿)Introduction.ppt
- 复旦大学:Trapping in scale-free networks with hierarchical organization of modularity.pptx
- 电子工业出版社:《计算机网络》课程教学资源(第五版,PPT课件讲稿)第十章 下一代因特网.ppt
- 卷积码的概率译码(PPT讲稿).ppt
- 上海交通大学:Basic Raster Graphics Algorithms for Drawing 2D Primitives.ppt
- 《编译原理》课程教学资源(PPT课件讲稿)第七章 中间代码生成.ppt
- 《MATLAB应用基础》课程教学资源(PPT课件讲稿)第4章 MATLAB的数值计算.ppt
- 安徽广播影视职业技术学院:《ASP动态网页设计实用教程》课程教学资源(PPT讲稿)第1章 ASP基础(贾海陶).ppt
- 白城师范学院:《数据库系统概论 An Introduction to Database System》课程教学资源(PPT课件讲稿)第六章 关系数据理论.pptx
- 中国科学技术大学:《数据结构及其算法》课程电子教案(PPT课件讲稿)第三章 栈和队列.pps
- 北京大学SAS俱乐部:SAS软件会员培训(PPT讲稿)SAS编程语言入门.ppt
- 泛型编程 Generic Programming(PPT讲稿)Templates.ppt
- 西安电子科技大学:《Mobile Programming》课程PPT教学课件(Android Programming)Lecture 9 Service and Broadcast Receiver.pptx
- 计算机问题求解(PPT讲稿)算法在计算机科学中的地位(算法的效率).pptx
- 《计算机组装与维修》课程教学资源(PPT讲稿)第7章 显示器.ppt
- 《Java语言程序设计》课程教学资源(PPT课件讲稿)第四章 Applet及其应用.ppt
- 《编译原理实践》课程教学资源(PPT讲稿)词法分析程序的自动生成器LEX.ppt
- 华中科技大学:《面向对象程序设计》课程PPT教学课件(Visual C++ 编程)第2讲 Visual C++ 6.0开发环境.ppt
- 东南大学:《泛型编程 Generic Programming》课程教学资源(PPT课件讲稿)Chapter 14 Templates.ppt
- Coded Caching under Arbitrary Popularity Distributions.pptx
- Distributed Systems and Networking Programmin(SOAP – Introduction).ppt
- 北京师范大学现代远程教育:《计算机应用基础》课程教学资源(PPT课件讲稿)第5章 Microsoft Excel 2010.pptx
- 图形处理及多媒体应用(PPT课件讲稿).pps
- Vitebi 译码.ppt