{"title":"Connection Pattern-Based P2P Application Identification Characteristic","authors":"Wang Jinsong, Zhang Yan, Wu Qing, Wu Gong-yi","doi":"10.1109/NPC.2007.62","DOIUrl":null,"url":null,"abstract":"A new methodology for P2P (peer-to-peer) host recognition is present in the paper, in which the transport layer connection characteristics of P2P Protocols is used, since many P2P application hosts acting both as servers and clients in this layer. Here, BT (BitTorrent), one of the most popular and representative P2P application in China, is taken as the example. To capture the traffic of P2P applications and non-P2P applications, the tool Sniffer is used. The evaluation experiments confirmed that the characteristics of P2P applications present in this paper are feasible and effective to distinguish P2P application hosts and non-P2P application hosts.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NPC.2007.62","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
A new methodology for P2P (peer-to-peer) host recognition is present in the paper, in which the transport layer connection characteristics of P2P Protocols is used, since many P2P application hosts acting both as servers and clients in this layer. Here, BT (BitTorrent), one of the most popular and representative P2P application in China, is taken as the example. To capture the traffic of P2P applications and non-P2P applications, the tool Sniffer is used. The evaluation experiments confirmed that the characteristics of P2P applications present in this paper are feasible and effective to distinguish P2P application hosts and non-P2P application hosts.