SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Chen‐Chi Wu1, Kuan‐Ta Chen2, Yu‐Chun Chang1, Chin‐Laung Lei1

 1Department of Electrical Engineering, National Taiwan University

        2Institute of Information Science, Academia Sinica




ICC09                                                            1
Talk Outline
        Introduction
        Fundamentals of our scheme
        Methodology
        Performance evaluation
        Conclusion




ICC09                                2
Introduction
        P2P traffic constitutes a substantial volume of Internet 
        traffic
        Accurately identify P2P applications from the network 
        traffic is important
          Network management, capacity planning, etc.
        Conventional approaches: port numbers or payload 
        signatures
          Dynamic ports, encrypted payload



ICC09                                                               3
Fundamentals of Our Scheme
        P2P applications generate two types of traffic
          Data transfer traffic
            File‐sharing or file‐redistribution
          Signaling traffic
            File information refreshment, peer discovery, control information 
            exchange, etc.
        Signaling activity is regulated by the underlying P2P 
        protocol
          Each P2P application may have a unique characteristic


ICC09                                                                        4
Fundamentals of Our Scheme
        Verify our conjecture
          Compare the signaling activity patterns of BitTorrent, 
          eMule, and Skype
        Traffic data
          Capture the traffic of 3 hosts that execute BitTorrent, 
          eMule, or Skype
          Assume packets with payload size smaller than 100 bytes 
          are signaling packets



ICC09                                                                5
Signaling Activity Patterns
        Assign id to hosts that were contacted by the monitored 
        host based on the order in which they are observed
        BitTorrent
          Intensive exchange of signaling packets
          The BitTorrent client progressively discovers new hosts




ICC09                                                               6
Signaling Activity Patterns
        eMule
          The number of hosts increases rapidly in the first 10 
          minutes but increases slowly thereafter
        Skype
          Most of signaling packets belong to the probe traffic




ICC09                                                              7
Proposed Scheme
        Identify P2P applications running on hosts based on the 
        signaling behavior



        How to characterize signaling traffic?




ICC09                                                              8
Signaling Behavior Characterization
        Keep track of signaling packets of a monitored host for a 
        period of time
        Count the number of hosts contacted and the number of 
        packets sent and received every minute
        Classify hosts contacted with the monitored host into 2 types
          Sending/receiving packets within 5 minutes => old host
          Otherwise => new host
        Characterize the signaling behavior on two levels
          Host level: based on the number of new or old hosts
          Message level: based on the number of new or old packets

ICC09                                                                   9
Signaling Behavior Features
                                         Host level
        Ratio of new / old hosts
        Growth rate of new / old hosts
        Correlation coefficient between the number of new and old hosts
                                     Message level
        Ratio of new / old packets
        Growth rate of new / old packets
        Correlation coefficient between the number of new and old packets




ICC09                                                                       10
Example
        Host level ‐ ratio of new hosts
          Keep track of hosts contacted with the monitored host
          Incoming direction in the 6th min.: B and D are old hosts; A, 
          G, and H are new hosts
          Ratio of new hosts in the 6th min. => 3/5
                                                             Old host          New host
               Incoming Outgoing
               Direction Direction




                                     A B    CD    BED        C B AE B         FG A


                                     A BC   BCD   BD      CBE D         B F   B GADH



                                      1      2     3          4          5      6
                                                  Monitor time (min.)
ICC09                                                                                     11
Identifier Design
        Adopt support vector machine (SVM)
        Training phase
        Derive features from each training data 
        Label each training data with the name of P2P applications
        Train the SVM classifier
        Identification phase
        Derive features from a signaling packet stream
        Use the trained classifier to determine the P2P application



ICC09                                                                 12
Traffic Data
        Category            Hosts         Packets
        BitTorrent            110,711     104,722,150
        eMule                  42,377      36,716,588
        Skype                  61,777      34,076,328
        World of Warcraft           218     2,528,359
        TELNET                      362    21,118,522
        HTTP                    4,448      28,264,360




ICC09                                                   13
Performance Evaluation
        10‐fold cross validation




ICC09                              14
Conclusion
        Summary
          Identify distinct P2P applications without examining 
          payload
          Characterize signaling behavior possessed by P2P 
          applications
        Future work
          Consider the case that a host launches multiple P2P 
          applications
          Short flows?


ICC09                                                             15
Thank you for your attention!




ICC09                                   16

Contenu connexe

Tendances

Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation ProtocolMatt Bynum
 
Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3Brendan Kearns
 
Advances in Network-adaptive Video Streaming
Advances in Network-adaptive Video StreamingAdvances in Network-adaptive Video Streaming
Advances in Network-adaptive Video StreamingVideoguy
 
6293213 sip-presentation
6293213 sip-presentation6293213 sip-presentation
6293213 sip-presentationJoe Trial
 
Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage Sridhar Kumar N
 
5. Rumba presentation
5. Rumba presentation5. Rumba presentation
5. Rumba presentationARCFIRE ICT
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networkingsangusajjan
 
SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)KHNOG
 
SpeechTEK 2009: Securing Cloud Telephony Aug2009
SpeechTEK 2009: Securing Cloud Telephony Aug2009SpeechTEK 2009: Securing Cloud Telephony Aug2009
SpeechTEK 2009: Securing Cloud Telephony Aug2009Voxeo Corp
 

Tendances (20)

Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation Protocol
 
Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3
 
Sip summary
Sip summarySip summary
Sip summary
 
Speech coding std
Speech coding stdSpeech coding std
Speech coding std
 
RTCP
RTCPRTCP
RTCP
 
Speech coding techniques
Speech coding techniquesSpeech coding techniques
Speech coding techniques
 
SIP for geeks
SIP for geeksSIP for geeks
SIP for geeks
 
Advances in Network-adaptive Video Streaming
Advances in Network-adaptive Video StreamingAdvances in Network-adaptive Video Streaming
Advances in Network-adaptive Video Streaming
 
6293213 sip-presentation
6293213 sip-presentation6293213 sip-presentation
6293213 sip-presentation
 
Chapter 9 - Multimedia Networking
Chapter 9 - Multimedia NetworkingChapter 9 - Multimedia Networking
Chapter 9 - Multimedia Networking
 
Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage
 
5. Rumba presentation
5. Rumba presentation5. Rumba presentation
5. Rumba presentation
 
Profile_Prateek
Profile_PrateekProfile_Prateek
Profile_Prateek
 
SIP security in IP telephony
SIP security in IP telephonySIP security in IP telephony
SIP security in IP telephony
 
Sip Paper
Sip PaperSip Paper
Sip Paper
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
UCL
UCLUCL
UCL
 
SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)
 
Sip crash course
Sip crash courseSip crash course
Sip crash course
 
SpeechTEK 2009: Securing Cloud Telephony Aug2009
SpeechTEK 2009: Securing Cloud Telephony Aug2009SpeechTEK 2009: Securing Cloud Telephony Aug2009
SpeechTEK 2009: Securing Cloud Telephony Aug2009
 

En vedette

OneClick: A Framework for Measuring Network Quality of Experience
OneClick: A Framework for Measuring Network Quality of ExperienceOneClick: A Framework for Measuring Network Quality of Experience
OneClick: A Framework for Measuring Network Quality of ExperienceAcademia Sinica
 
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay NodesToward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay NodesAcademia Sinica
 
The Impact of Network Variabilities on TCP Clocking Schemes
The Impact of Network Variabilities on TCP Clocking SchemesThe Impact of Network Variabilities on TCP Clocking Schemes
The Impact of Network Variabilities on TCP Clocking SchemesAcademia Sinica
 
A Collusion-Resistant Automation Scheme for Social Moderation Systems
A Collusion-Resistant Automation Scheme for Social Moderation SystemsA Collusion-Resistant Automation Scheme for Social Moderation Systems
A Collusion-Resistant Automation Scheme for Social Moderation SystemsAcademia Sinica
 
User Identification based on Game-Play Activity Patterns
User Identification based on Game-Play Activity PatternsUser Identification based on Game-Play Activity Patterns
User Identification based on Game-Play Activity PatternsAcademia Sinica
 
An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google ...
An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google ...An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google ...
An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google ...Academia Sinica
 
Automatic Storytelling in Comics: A Case Study on World of Warcraft
Automatic Storytelling in Comics: A Case Study on World of WarcraftAutomatic Storytelling in Comics: A Case Study on World of Warcraft
Automatic Storytelling in Comics: A Case Study on World of WarcraftAcademia Sinica
 
Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachAcademia Sinica
 
An Analytical Study of Puzzle Selection Strategies for the ESP Game
An Analytical Study of Puzzle Selection Strategies for the ESP GameAn Analytical Study of Puzzle Selection Strategies for the ESP Game
An Analytical Study of Puzzle Selection Strategies for the ESP GameAcademia Sinica
 

En vedette (9)

OneClick: A Framework for Measuring Network Quality of Experience
OneClick: A Framework for Measuring Network Quality of ExperienceOneClick: A Framework for Measuring Network Quality of Experience
OneClick: A Framework for Measuring Network Quality of Experience
 
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay NodesToward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
 
The Impact of Network Variabilities on TCP Clocking Schemes
The Impact of Network Variabilities on TCP Clocking SchemesThe Impact of Network Variabilities on TCP Clocking Schemes
The Impact of Network Variabilities on TCP Clocking Schemes
 
A Collusion-Resistant Automation Scheme for Social Moderation Systems
A Collusion-Resistant Automation Scheme for Social Moderation SystemsA Collusion-Resistant Automation Scheme for Social Moderation Systems
A Collusion-Resistant Automation Scheme for Social Moderation Systems
 
User Identification based on Game-Play Activity Patterns
User Identification based on Game-Play Activity PatternsUser Identification based on Game-Play Activity Patterns
User Identification based on Game-Play Activity Patterns
 
An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google ...
An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google ...An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google ...
An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google ...
 
Automatic Storytelling in Comics: A Case Study on World of Warcraft
Automatic Storytelling in Comics: A Case Study on World of WarcraftAutomatic Storytelling in Comics: A Case Study on World of Warcraft
Automatic Storytelling in Comics: A Case Study on World of Warcraft
 
Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis Approach
 
An Analytical Study of Puzzle Selection Strategies for the ESP Game
An Analytical Study of Puzzle Selection Strategies for the ESP GameAn Analytical Study of Puzzle Selection Strategies for the ESP Game
An Analytical Study of Puzzle Selection Strategies for the ESP Game
 

Similaire à Peer-to-Peer Application Recognition Based on Signaling Activity

Cloud Native Networking & Security with Cilium & eBPF
Cloud Native Networking & Security with Cilium & eBPFCloud Native Networking & Security with Cilium & eBPF
Cloud Native Networking & Security with Cilium & eBPFRaphaël PINSON
 
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT PROIDEA
 
New flaws in WPA-TKIP
New flaws in WPA-TKIPNew flaws in WPA-TKIP
New flaws in WPA-TKIPvanhoefm
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationOlehLevytskyi1
 
Challenges and experiences with IPTV from a network point of view
Challenges and experiences with IPTV from a network point of viewChallenges and experiences with IPTV from a network point of view
Challenges and experiences with IPTV from a network point of viewbrouer
 
Cilium - API-aware Networking and Security for Containers based on BPF
Cilium - API-aware Networking and Security for Containers based on BPFCilium - API-aware Networking and Security for Containers based on BPF
Cilium - API-aware Networking and Security for Containers based on BPFThomas Graf
 
Cilium - Network security for microservices
Cilium - Network security for microservicesCilium - Network security for microservices
Cilium - Network security for microservicesThomas Graf
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshopKae Hsu
 
Optimizing QoE and Latency of Live Video Streaming Using Edge Computing a...
Optimizing  QoE and Latency of  Live Video Streaming Using  Edge Computing  a...Optimizing  QoE and Latency of  Live Video Streaming Using  Edge Computing  a...
Optimizing QoE and Latency of Live Video Streaming Using Edge Computing a...Alpen-Adria-Universität
 

Similaire à Peer-to-Peer Application Recognition Based on Signaling Activity (20)

Multipath TCP
Multipath TCPMultipath TCP
Multipath TCP
 
3rd edition chapter2
3rd edition chapter23rd edition chapter2
3rd edition chapter2
 
Week3 applications
Week3 applicationsWeek3 applications
Week3 applications
 
Chapter2[one.]
Chapter2[one.]Chapter2[one.]
Chapter2[one.]
 
Np unit1
Np unit1Np unit1
Np unit1
 
Cloud Native Networking & Security with Cilium & eBPF
Cloud Native Networking & Security with Cilium & eBPFCloud Native Networking & Security with Cilium & eBPF
Cloud Native Networking & Security with Cilium & eBPF
 
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
 
New flaws in WPA-TKIP
New flaws in WPA-TKIPNew flaws in WPA-TKIP
New flaws in WPA-TKIP
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Challenges and experiences with IPTV from a network point of view
Challenges and experiences with IPTV from a network point of viewChallenges and experiences with IPTV from a network point of view
Challenges and experiences with IPTV from a network point of view
 
App layer
App layerApp layer
App layer
 
Cilium - API-aware Networking and Security for Containers based on BPF
Cilium - API-aware Networking and Security for Containers based on BPFCilium - API-aware Networking and Security for Containers based on BPF
Cilium - API-aware Networking and Security for Containers based on BPF
 
Dropped image 170
Dropped image 170Dropped image 170
Dropped image 170
 
Cilium - Network security for microservices
Cilium - Network security for microservicesCilium - Network security for microservices
Cilium - Network security for microservices
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshop
 
Optimizing QoE and Latency of Live Video Streaming Using Edge Computing a...
Optimizing  QoE and Latency of  Live Video Streaming Using  Edge Computing  a...Optimizing  QoE and Latency of  Live Video Streaming Using  Edge Computing  a...
Optimizing QoE and Latency of Live Video Streaming Using Edge Computing a...
 
ATCA's Big Femtocell Opportunity
ATCA's Big Femtocell OpportunityATCA's Big Femtocell Opportunity
ATCA's Big Femtocell Opportunity
 
Voip basics
Voip basicsVoip basics
Voip basics
 
Voip basics
Voip basicsVoip basics
Voip basics
 

Plus de Academia Sinica

Computational Social Science:The Collaborative Futures of Big Data, Computer ...
Computational Social Science:The Collaborative Futures of Big Data, Computer ...Computational Social Science:The Collaborative Futures of Big Data, Computer ...
Computational Social Science:The Collaborative Futures of Big Data, Computer ...Academia Sinica
 
Games on Demand: Are We There Yet?
Games on Demand: Are We There Yet?Games on Demand: Are We There Yet?
Games on Demand: Are We There Yet?Academia Sinica
 
Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...
Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...
Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...Academia Sinica
 
Cloud Gaming Onward: Research Opportunities and Outlook
Cloud Gaming Onward: Research Opportunities and OutlookCloud Gaming Onward: Research Opportunities and Outlook
Cloud Gaming Onward: Research Opportunities and OutlookAcademia Sinica
 
Quantifying User Satisfaction in Mobile Cloud Games
Quantifying User Satisfaction in Mobile Cloud GamesQuantifying User Satisfaction in Mobile Cloud Games
Quantifying User Satisfaction in Mobile Cloud GamesAcademia Sinica
 
量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值
量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值
量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值Academia Sinica
 
On The Battle between Online Gamers and Lags
On The Battle between Online Gamers and LagsOn The Battle between Online Gamers and Lags
On The Battle between Online Gamers and LagsAcademia Sinica
 
Understanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client GamingUnderstanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client GamingAcademia Sinica
 
Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof FrameworkQuantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof FrameworkAcademia Sinica
 
Online Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired ComparisonsOnline Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired ComparisonsAcademia Sinica
 
GamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming SystemGamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming SystemAcademia Sinica
 
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic ApproachAre All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic ApproachAcademia Sinica
 
Forecasting Online Game Addictiveness
Forecasting Online Game AddictivenessForecasting Online Game Addictiveness
Forecasting Online Game AddictivenessAcademia Sinica
 
Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachAcademia Sinica
 
Inferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype TrafficInferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype TrafficAcademia Sinica
 
Game Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar TrajectoryGame Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar TrajectoryAcademia Sinica
 
Improving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user TrustinessImproving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user TrustinessAcademia Sinica
 
Tuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User SatisfactionTuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User SatisfactionAcademia Sinica
 
Network Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player InteractionNetwork Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player InteractionAcademia Sinica
 
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter
Mitigating Active Attacks Towards Client Networks Using the Bitmap FilterMitigating Active Attacks Towards Client Networks Using the Bitmap Filter
Mitigating Active Attacks Towards Client Networks Using the Bitmap FilterAcademia Sinica
 

Plus de Academia Sinica (20)

Computational Social Science:The Collaborative Futures of Big Data, Computer ...
Computational Social Science:The Collaborative Futures of Big Data, Computer ...Computational Social Science:The Collaborative Futures of Big Data, Computer ...
Computational Social Science:The Collaborative Futures of Big Data, Computer ...
 
Games on Demand: Are We There Yet?
Games on Demand: Are We There Yet?Games on Demand: Are We There Yet?
Games on Demand: Are We There Yet?
 
Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...
Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...
Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...
 
Cloud Gaming Onward: Research Opportunities and Outlook
Cloud Gaming Onward: Research Opportunities and OutlookCloud Gaming Onward: Research Opportunities and Outlook
Cloud Gaming Onward: Research Opportunities and Outlook
 
Quantifying User Satisfaction in Mobile Cloud Games
Quantifying User Satisfaction in Mobile Cloud GamesQuantifying User Satisfaction in Mobile Cloud Games
Quantifying User Satisfaction in Mobile Cloud Games
 
量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值
量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值
量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值
 
On The Battle between Online Gamers and Lags
On The Battle between Online Gamers and LagsOn The Battle between Online Gamers and Lags
On The Battle between Online Gamers and Lags
 
Understanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client GamingUnderstanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client Gaming
 
Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof FrameworkQuantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework
 
Online Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired ComparisonsOnline Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired Comparisons
 
GamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming SystemGamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming System
 
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic ApproachAre All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
 
Forecasting Online Game Addictiveness
Forecasting Online Game AddictivenessForecasting Online Game Addictiveness
Forecasting Online Game Addictiveness
 
Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis Approach
 
Inferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype TrafficInferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype Traffic
 
Game Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar TrajectoryGame Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar Trajectory
 
Improving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user TrustinessImproving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
 
Tuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User SatisfactionTuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User Satisfaction
 
Network Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player InteractionNetwork Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player Interaction
 
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter
Mitigating Active Attacks Towards Client Networks Using the Bitmap FilterMitigating Active Attacks Towards Client Networks Using the Bitmap Filter
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter
 

Dernier

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Dernier (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Peer-to-Peer Application Recognition Based on Signaling Activity

  • 2. Talk Outline Introduction Fundamentals of our scheme Methodology Performance evaluation Conclusion ICC09 2
  • 3. Introduction P2P traffic constitutes a substantial volume of Internet  traffic Accurately identify P2P applications from the network  traffic is important Network management, capacity planning, etc. Conventional approaches: port numbers or payload  signatures Dynamic ports, encrypted payload ICC09 3
  • 4. Fundamentals of Our Scheme P2P applications generate two types of traffic Data transfer traffic File‐sharing or file‐redistribution Signaling traffic File information refreshment, peer discovery, control information  exchange, etc. Signaling activity is regulated by the underlying P2P  protocol Each P2P application may have a unique characteristic ICC09 4
  • 5. Fundamentals of Our Scheme Verify our conjecture Compare the signaling activity patterns of BitTorrent,  eMule, and Skype Traffic data Capture the traffic of 3 hosts that execute BitTorrent,  eMule, or Skype Assume packets with payload size smaller than 100 bytes  are signaling packets ICC09 5
  • 6. Signaling Activity Patterns Assign id to hosts that were contacted by the monitored  host based on the order in which they are observed BitTorrent Intensive exchange of signaling packets The BitTorrent client progressively discovers new hosts ICC09 6
  • 7. Signaling Activity Patterns eMule The number of hosts increases rapidly in the first 10  minutes but increases slowly thereafter Skype Most of signaling packets belong to the probe traffic ICC09 7
  • 8. Proposed Scheme Identify P2P applications running on hosts based on the  signaling behavior How to characterize signaling traffic? ICC09 8
  • 9. Signaling Behavior Characterization Keep track of signaling packets of a monitored host for a  period of time Count the number of hosts contacted and the number of  packets sent and received every minute Classify hosts contacted with the monitored host into 2 types Sending/receiving packets within 5 minutes => old host Otherwise => new host Characterize the signaling behavior on two levels Host level: based on the number of new or old hosts Message level: based on the number of new or old packets ICC09 9
  • 10. Signaling Behavior Features Host level Ratio of new / old hosts Growth rate of new / old hosts Correlation coefficient between the number of new and old hosts Message level Ratio of new / old packets Growth rate of new / old packets Correlation coefficient between the number of new and old packets ICC09 10
  • 11. Example Host level ‐ ratio of new hosts Keep track of hosts contacted with the monitored host Incoming direction in the 6th min.: B and D are old hosts; A,  G, and H are new hosts Ratio of new hosts in the 6th min. => 3/5 Old host New host Incoming Outgoing Direction Direction A B CD BED C B AE B FG A A BC BCD BD CBE D B F B GADH 1 2 3 4 5 6 Monitor time (min.) ICC09 11
  • 12. Identifier Design Adopt support vector machine (SVM) Training phase Derive features from each training data  Label each training data with the name of P2P applications Train the SVM classifier Identification phase Derive features from a signaling packet stream Use the trained classifier to determine the P2P application ICC09 12
  • 13. Traffic Data Category Hosts Packets BitTorrent 110,711 104,722,150 eMule 42,377 36,716,588 Skype 61,777 34,076,328 World of Warcraft 218 2,528,359 TELNET 362 21,118,522 HTTP 4,448 28,264,360 ICC09 13
  • 14. Performance Evaluation 10‐fold cross validation ICC09 14
  • 15. Conclusion Summary Identify distinct P2P applications without examining  payload Characterize signaling behavior possessed by P2P  applications Future work Consider the case that a host launches multiple P2P  applications Short flows? ICC09 15