To see the other types of publications on this topic, follow the link: P2P traffic.

Journal articles on the topic 'P2P traffic'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'P2P traffic.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Iqbal, Masab, Luis Velasco, Marc Ruiz, et al. "Supporting Heterogenous Traffic on Top of Point-to-Multipoint Light-Trees." Sensors 23, no. 5 (2023): 2500. http://dx.doi.org/10.3390/s23052500.

Full text
Abstract:
New 5 G and beyond services demand innovative solutions in optical transport to increase efficiency and flexibility and reduce capital (CAPEX) and operational (OPEX) expenditures to support heterogeneous and dynamic traffic. In this context, optical point-to-multipoint (P2MP) connectivity is seen as an alternative to provide connectivity to multiple sites from a single source, thus potentially both reducing CAPEX and OPEX. Digital subcarrier multiplexing (DSCM) has been shown as a feasible candidate for optical P2MP in view of its ability to generate multiple subcarriers (SC) in the frequency
APA, Harvard, Vancouver, ISO, and other styles
2

Velasco, Luis. "Supporting Heterogenous Traffic on Top of Point-to-Multipoint Light-Trees." Sensors 23, no. 5 (2024): 1–16. https://doi.org/10.3390/s23052500.

Full text
Abstract:
New 5 G and beyond services demand innovative solutions in optical transport to increase efficiency and flexibility and reduce capital (CAPEX) and operational (OPEX) expenditures to support heterogeneous and dynamic traffic. In this context, optical point-to-multipoint (P2MP) connectivity is seen as an alternative to provide connectivity to multiple sites from a single source, thus potentially both reducing CAPEX and OPEX. Digital subcarrier multiplexing (DSCM) has been shown as a feasible candidate for optical P2MP in view of its ability to generate multiple subcarriers (SC) in the frequency
APA, Harvard, Vancouver, ISO, and other styles
3

LU, Gang, Hong-Li ZHANG, and Lin YE. "P2P Traffic Identification." Journal of Software 22, no. 6 (2011): 1281–98. http://dx.doi.org/10.3724/sp.j.1001.2011.03995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, GuoQiang, MingDong Tang, SuQi Cheng, et al. "P2P traffic optimization." Science China Information Sciences 55, no. 7 (2011): 1475–92. http://dx.doi.org/10.1007/s11432-011-4464-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gong, Shang Fu, and Juan Chen. "A P2P Traffic Detection Method Based on Support Vector Machine." Applied Mechanics and Materials 198-199 (September 2012): 1280–85. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.1280.

Full text
Abstract:
The widely use of P2P (Peer-to-Peer) technology has caused resources take up too much, security risks and other problems, it is necessary to detect and control P2P traffic. After analyzing current P2P detection methods, a new method called TCBDM (Traffic Characters Based Detection Method) is put forward which combines P2P traffic character with support vector machine to detect P2P traffic. By choosing P2P traffic characters which differ from other network traffic, such as Round-Trip Time (RTT), the method creates a SVM classifier, uses a package named LIBSVM to classify P2P traffic in Moore_Se
APA, Harvard, Vancouver, ISO, and other styles
6

Wu, Min, Ru Chuan Wang, Jing Li, and Zhi Jie Han. "A Novel P2P Business Traffic Prediction Algorithm." Key Engineering Materials 467-469 (February 2011): 1339–44. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.1339.

Full text
Abstract:
The increasing P2P network traffic on the Internet has leaded to the problem of network congestion. In the consequence of the diversification of the P2P business and protocol, research on the management of P2P traffic has many problems to resolve. Prediction of the P2P traffic is the kernel problem in the P2P traffic management. Based on the existed P2P traffic characters, this paper structures a P2P traffic model, gives a traffic prediction algorithm bases on wavelet-analysis, and proves the accuracy of the algorithm. Simulation experiment figures that the algorithm has a high prediction prec
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Chunzhi, Huili Zhang, and Zhiwei Ye. "A peer to peer traffic identification method based on wavelet and particle swarm optimization algorithm." International Journal of Wavelets, Multiresolution and Information Processing 13, no. 06 (2015): 1550048. http://dx.doi.org/10.1142/s0219691315500484.

Full text
Abstract:
With the rapid development of network, the peer-to-peer (P2P) traffic has become one of the most important traffics on the Internet; meanwhile, it also brings many security problems to the network management. Thus, nowadays, P2P traffic identification is the hottest topic of P2P traffic management. Much effort has been made on this topic, however, effectiveness remains an issue and the classification performance needs to be further improved. Support vector machine (SVM) has advantages with resolving small samples and high dimension for P2P classification problems. However, the performance of S
APA, Harvard, Vancouver, ISO, and other styles
8

Bhatia, Max, Vikrant Sharma, Parminder Singh, and Mehedi Masud. "Multi-Level P2P Traffic Classification Using Heuristic and Statistical-Based Techniques: A Hybrid Approach." Symmetry 12, no. 12 (2020): 2117. http://dx.doi.org/10.3390/sym12122117.

Full text
Abstract:
Peer-to-peer (P2P) applications have been popular among users for more than a decade. They consume a lot of network bandwidth, due to the fact that network administrators face several issues such as congestion, security, managing resources, etc. Hence, its accurate classification will allow them to maintain a Quality of Service for various applications. Conventional classification techniques, i.e., port-based and payload-based techniques alone, have proved ineffective in accurately classifying P2P traffic as they possess significant limitations. As new P2P applications keep emerging and existi
APA, Harvard, Vancouver, ISO, and other styles
9

Yi, Yan, Zheng Yuan Su, Qing Jiang Zhao, and Zu Cheng Dai. "Research of P2P Traffic Real-Time Monitoring Technology Based on DPI." Applied Mechanics and Materials 340 (July 2013): 451–55. http://dx.doi.org/10.4028/www.scientific.net/amm.340.451.

Full text
Abstract:
As the P2P technology brings an abundance of network shared resources and information services, P2P technology also brings a lot of bandwidth, intellectual property, information security problems. Against the problems, and studying technologies of P2P traffic flow monitoring, the paper presents an improved P2P traffic monitoring method based on advantages and disadvantages of current P2P flow monitoring methods. According to the test results, the system achieved well in the demand of control P2P traffic.
APA, Harvard, Vancouver, ISO, and other styles
10

Yan, Jinghua, Zhigang Wu, Hao Luo, and Shuzhuang Zhang. "P2P Traffic Identification Based on Host and Flow Behaviour Characteristics." Cybernetics and Information Technologies 13, no. 3 (2013): 64–76. http://dx.doi.org/10.2478/cait-2013-0026.

Full text
Abstract:
Abstract Peer-to-Peer (P2P) networks have been widely applied in file sharing, streaming media, instant messaging and other fields, which have attracted large attention. At the same time P2P networks traffic worsens the congestion of a network significantly. In order to better manage and control P2P traffic, it is important to identify P2P traffic accurately. In this paper we propose a novel P2P identification scheme, based on the host and flow behaviour characteristics of P2P traffic. First we determine if a host takes part in a P2P application by matching its behaviour with some predefined h
APA, Harvard, Vancouver, ISO, and other styles
11

Ye, Wujian, and Kyungsan Cho. "P2P and P2P botnet traffic classification in two stages." Soft Computing 21, no. 5 (2015): 1315–26. http://dx.doi.org/10.1007/s00500-015-1863-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Ma, Zhi Qiang. "Research on P2P Traffic Monitoring System Based on DPI Technology." Applied Mechanics and Materials 686 (October 2014): 277–81. http://dx.doi.org/10.4028/www.scientific.net/amm.686.277.

Full text
Abstract:
This paper focuses on the key technologies of P2P technology and network traffic monitoring, which focuses on AC automaton and bypass interference control technology, and on based of it, we design a new P2P traffic monitoring system. The system uses DPI and DFI recognition technology, as well as straight loss and bypass interference control technology, basically meet the recognition and control of P2P traffic. Finally, the test results show that this system recognition accuracy of P2P traffic is high, good control effect, function and performance meet the design requirements.
APA, Harvard, Vancouver, ISO, and other styles
13

Huang, Zhi Min, and Qing Feng Wu. "The Design and Implementation of P2P Traffic Intelligent Guidance System." Applied Mechanics and Materials 475-476 (December 2013): 798–802. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.798.

Full text
Abstract:
Dropping or inhibition is the traditional way to control P2P traffic, which affects the user's experience. This paper implements an intelligent P2P traffic guidance scheme which combines recent P2PCache technology and some intelligent strategies. The scheme can fully make inner-network users interconnected, reduce the P2P interconnection traffic and improve the users experience.
APA, Harvard, Vancouver, ISO, and other styles
14

Yang, Shuang, Ye Du, and Ru Hui Zhang. "Implementation of P2P Traffic Identification System." Applied Mechanics and Materials 44-47 (December 2010): 3318–21. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.3318.

Full text
Abstract:
By analyzing packets of the transport layer and the traffic flow statistic characteristics in the peer-to-peer (P2P) applications, a new P2P traffic identification system is presented. The new method in the system relies on the observation of the first few data packets of a TCP/UDP connection. It not only can identify more P2P applications, but also can identify the known and unknown P2P applications even if the data of them is encrypted. According to the results by passing a large number of tests, the system has higher identify-rate to identify the P2P applications and lower false negative an
APA, Harvard, Vancouver, ISO, and other styles
15

Jamil, Haitham Ahmed, Bushra M. Ali, Mosab Hamdan, and Ahmed E. Osman. "Online P2P Internet Traffic Classification and Mitigation Based on Snort and ML." European Journal of Engineering Research and Science 4, no. 10 (2019): 131–37. http://dx.doi.org/10.24018/ejers.2019.4.10.1534.

Full text
Abstract:
Peer to peer applications have modified the nature of internet traffic. It will consume high internet bandwidth and affect the performance of traditional traffic internet applications. Therefore, the management and monitoring activity of internet traffic is the important activities involved in the optimization. In order to detect and mitigate the P2P traffic, port, payload, and transport layer based methods were developed in the past. Nevertheless, the performances of these methods were not up to the expectation. Machine Learning (ML) is one of the promising methods to identify and mitigate th
APA, Harvard, Vancouver, ISO, and other styles
16

Jamil, Haitham Ahmed, Bushra M. Ali, Mosab Hamdan, and Ahmed E. Osman. "Online P2P Internet Traffic Classification and Mitigation Based on Snort and ML." European Journal of Engineering and Technology Research 4, no. 10 (2019): 131–37. http://dx.doi.org/10.24018/ejeng.2019.4.10.1534.

Full text
Abstract:
Peer to peer applications have modified the nature of internet traffic. It will consume high internet bandwidth and affect the performance of traditional traffic internet applications. Therefore, the management and monitoring activity of internet traffic is the important activities involved in the optimization. In order to detect and mitigate the P2P traffic, port, payload, and transport layer based methods were developed in the past. Nevertheless, the performances of these methods were not up to the expectation. Machine Learning (ML) is one of the promising methods to identify and mitigate th
APA, Harvard, Vancouver, ISO, and other styles
17

Raahemi, Bijan, and Ali Mumtaz. "Classification of Peer-to-Peer Traffic Using A Two-Stage Window-Based Classifier With Fast Decision Tree and IP Layer Attributes." International Journal of Data Warehousing and Mining 6, no. 3 (2010): 28–42. http://dx.doi.org/10.4018/jdwm.2010070103.

Full text
Abstract:
This paper presents a new approach using data mining techniques, and in particular a two-stage architecture, for classification of Peer-to-Peer (P2P) traffic in IP networks where in the first stage the traffic is filtered using standard port numbers and layer 4 port matching to label well-known P2P and NonP2P traffic. The labeled traffic produced in the first stage is used to train a Fast Decision Tree (FDT) classifier with high accuracy. The Unknown traffic is then applied to the FDT model which classifies the traffic into P2P and NonP2P with high accuracy. The two-stage architecture not only
APA, Harvard, Vancouver, ISO, and other styles
18

Raveesha, H. H. "DETECTION OF STEALTHY P2P BOT COMPROMISED HOSTS IN A NETWORK." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 6 (2016): 843–46. https://doi.org/10.5281/zenodo.56028.

Full text
Abstract:
Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency against take-down efforts. Besides being harder to take down, modern botnets tend to be stealthier in the way they perform malicious activities, making current detection approaches ineffective. In addition, the rapidly growing volume of network traffic calls for high scalability of detection systems. In this paper, we propose a novel scalable botnet detection system capable of detecting stealthy P2P botnets. Our system first identifies all hosts that are likely engaged in P2P communications. It then derive
APA, Harvard, Vancouver, ISO, and other styles
19

Bhatia, Max, and Mritunjay Kumar Rai. "Identifying P2P traffic: A survey." Peer-to-Peer Networking and Applications 10, no. 5 (2016): 1182–203. http://dx.doi.org/10.1007/s12083-016-0471-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Xing, Ying, Hui Shu, Fei Kang, and Hao Zhao. "Peertrap: An Unstructured P2P Botnet Detection Framework Based on SAW Community Discovery." Wireless Communications and Mobile Computing 2022 (February 8, 2022): 1–18. http://dx.doi.org/10.1155/2022/9900396.

Full text
Abstract:
Botnet has become one of the serious threats to the Internet ecosystem, and botnet detection is crucial for tracking and mitigating network threats on the Internet. In the evolution of emerging botnets, peer-to-peer (P2P) botnets are more dangerous and resistant because of their distributed characteristics. Among them, unstructured P2P botnets use custom protocols for communication, which can be integrated with legitimate P2P traffic. Moreover, their topological structure is more complex, and a complete topology cannot be obtained easily, making them more concealed and difficult to detect. The
APA, Harvard, Vancouver, ISO, and other styles
21

Kerpez, Ken, Yuanqiu Luo, and Frank J. Effenberger. "Bandwidth Reduction via Localized Peer-to-Peer (P2P) Video." International Journal of Digital Multimedia Broadcasting 2010 (2010): 1–10. http://dx.doi.org/10.1155/2010/562832.

Full text
Abstract:
This paper presents recent research into P2P distribution of video that can be highly localized, preferably sharing content among users on the same access network and Central Office (CO). Models of video demand and localized P2P serving areas are presented. Detailed simulations of passive optical networks (PON) are run, and these generate statistics of P2P video localization. Next-Generation PON (NG-PON) is shown to fully enable P2P video localization, but the lower rates of Gigabit-PON (GPON) restrict performance. Results here show that nearlyallof the traffic volume of unicast video could be
APA, Harvard, Vancouver, ISO, and other styles
22

Kucharzak, Michal, Adam Siwek, and Krzysztof Walkowiak. "Comparison of Evolutionary Algorithm and Heuristics for Flow Optimization in P2P Systems." International Journal of Electronics and Telecommunications 56, no. 2 (2010): 145–52. http://dx.doi.org/10.2478/v10177-010-0019-y.

Full text
Abstract:
Comparison of Evolutionary Algorithm and Heuristics for Flow Optimization in P2P SystemsNowadays, many Internet users make use of Peer-to-Peer (P2P) systems to download electronic content including music, movies, software, etc. Growing popularity in P2P based protocol implementations for file sharing purposes caused that the P2P traffic exceeds Web traffic and in accordance with to many statistics, P2P systems produce a more than 50% of the whole Internet traffic. Therefore, P2P systems provide remarkable income for Internet Service Providers (ISP). However, at the same time P2P systems genera
APA, Harvard, Vancouver, ISO, and other styles
23

Khan, Riaz Ullah, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz, and Mamoun Alazab. "An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers." Applied Sciences 9, no. 11 (2019): 2375. http://dx.doi.org/10.3390/app9112375.

Full text
Abstract:
In recent years, the botnets have been the most common threats to network security since it exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been used to carry phishing links, to perform attacks and provide malicious services on the internet. It is challenging to identify Peer-to-peer (P2P) botnets as compared to Internet Relay Chat (IRC), Hypertext Transfer Protocol (HTTP) and other types of botnets because P2P traffic has typical features of the centralization and distribution. To resolve the issues of P2P botnet identification, we propose an effective m
APA, Harvard, Vancouver, ISO, and other styles
24

Li, Yanjun, Guoqing Zhang, and Guoqiang Zhang. "ISP-Friendly Data Scheduling by Advanced Locality-Aware Network Coding for P2P Distribution Cloud." Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/968328.

Full text
Abstract:
Peer-to-peer (P2P) file distribution imposes increasingly heavy traffic burden on the Internet service providers (ISPs). The vast volume of traffic pushes up ISPs’ costs in routing and investment and degrades their networks performance. Building ISP-friendly P2P is therefore of critical importance for ISPs and P2P services. So far most efforts in this area focused on improving the locality-awareness of P2P applications, for example, to construct overlay networks with better knowledge of the underlying network topology. There is, however, growing recognition that data scheduling algorithms also
APA, Harvard, Vancouver, ISO, and other styles
25

Sousa, Pedro. "Towards Effective Control of P2P Traffic Aggregates in Network Infrastructures." Journal of Communications Software and Systems 11, no. 1 (2015): 37. http://dx.doi.org/10.24138/jcomss.v11i1.116.

Full text
Abstract:
Nowadays, many P2P applications proliferate in the Internet. The attractiveness of many of these systems relies on the collaborative approach used to exchange large resources without the dependence and associated constraints of centralized approaches where a single server is responsible to handle all the requests from the clients. As consequence, some P2P systems are also interesting and cost-effective approaches to be adopted by content providers and other Internet players. However, there areseveral coexistence problems between P2P applications and Internet Service Providers (ISPs) due to the
APA, Harvard, Vancouver, ISO, and other styles
26

Scanlon, Mark, Alan Hannaway, and Mohand-Tahar Kechadi. "Investigating Cybercrimes that Occur on Documented P2P Networks." International Journal of Ambient Computing and Intelligence 3, no. 2 (2011): 56–63. http://dx.doi.org/10.4018/jaci.2011040104.

Full text
Abstract:
The popularity of Peer-to-Peer (P2P) Internet communication technologies being exploited to aid cybercrime is ever increasing. P2P systems can be used or exploited to aid in the execution of a large number of online criminal activities, e.g., copyright infringement, fraud, malware and virus distribution, botnet creation, and control. P2P technology is perhaps most famous for the unauthorised distribution of copyrighted materials since the late 1990’s, with the popularity of file-sharing programs such as Napster. In 2004, P2P traffic accounted for 80% of all Internet traffic and in 2005, specif
APA, Harvard, Vancouver, ISO, and other styles
27

Sun, Ru Xia, and Chun Yong Yin. "P2P Traffic Identification Algorithm Based on Topology." Advanced Materials Research 487 (March 2012): 297–300. http://dx.doi.org/10.4028/www.scientific.net/amr.487.297.

Full text
Abstract:
The botnet consists of some computers controlled by an attacker and has become a major threat to the internet and users. Because the p2p botnet is a distributed network, making the identification of p2p bots is very difficult. In response to this threat, we present a p2p identification algorithm based on topology. This method only depends on three network behavior features. Our approach has a high detection rate and an acceptable low false alarm rate.
APA, Harvard, Vancouver, ISO, and other styles
28

Richardson, Lucy M., Matthew D. Luker, Christopher M. Day, Mark Taylor, and Darcy M. Bullock. "Outcome Assessment of Peer-to-Peer Adaptive Control Adjacent to a National Park." Transportation Research Record: Journal of the Transportation Research Board 2620, no. 1 (2017): 43–53. http://dx.doi.org/10.3141/2620-05.

Full text
Abstract:
In the town of Moab, Utah, a combination of seasonal tourist traffic, heavy truck traffic, and high pedestrian volumes creates a unique traffic management challenge; Moab’s remote location adds additional challenges for real-time traffic monitoring and maintaining of signal timing plans. The Main Street corridor is a strong candidate for an adaptive traffic control system (ATCS). Peer-to-peer (P2P) communication and user-definable control logic were used to develop and implement a cost-effective ATCS called “P2P adaptive control” that used only the existing local controllers and detection. The
APA, Harvard, Vancouver, ISO, and other styles
29

CHENG, Wei-qing, Jian GONG, and Wei DING. "Identifying file-sharing P2P traffic based on traffic characteristics." Journal of China Universities of Posts and Telecommunications 15, no. 4 (2008): 112–20. http://dx.doi.org/10.1016/s1005-8885(08)60414-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Xiaan Bi, Dafang Zhang, Xiaobo Yang, and Sheng Chen. "An Efficient P2P Traffic Identification Scheme." International Journal of Digital Content Technology and its Applications 5, no. 12 (2011): 459–67. http://dx.doi.org/10.4156/jdcta.vol5.issue12.56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Liu, San-Min, and Zhi-Xin Sun. "Active learning for P2P traffic identification." Peer-to-Peer Networking and Applications 8, no. 5 (2014): 733–40. http://dx.doi.org/10.1007/s12083-014-0281-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Hu, Yan, Dah-Ming Chiu, and John C. S. Lui. "Profiling and identification of P2P traffic." Computer Networks 53, no. 6 (2009): 849–63. http://dx.doi.org/10.1016/j.comnet.2008.11.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Rahbarinia, Babak, Roberto Perdisci, Andrea Lanzi, and Kang Li. "PeerRush: Mining for unwanted P2P traffic." Journal of Information Security and Applications 19, no. 3 (2014): 194–208. http://dx.doi.org/10.1016/j.jisa.2014.03.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ge, Jun Wei, Ming Zhao, and Yi Qiu Fang. "A Behavior-Based Rapid Method for P2P Traffic Identification." Applied Mechanics and Materials 380-384 (August 2013): 3661–66. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.3661.

Full text
Abstract:
This paper presents a rapid identification model and analyses the behavioral characteristics which is different from non-P2P applications on link pattern through analysis on three P2P applications. This method classifies P2P applications in the background and improves the recognition efficiency through the effective combination of behavioral characteristics and valid flows filter on the premise of maintaining the recognition accuracy. In the packet processing, matching frequency parameter has been using to increase matching efficiency. The experimental results show that P2P traffic can be effe
APA, Harvard, Vancouver, ISO, and other styles
35

Bhushan, Shashi, M. Dave, and R. B. Patel. "Reducing Network Overhead with Common Junction Methodology." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (2011): 51–61. http://dx.doi.org/10.4018/jmcmc.2011070104.

Full text
Abstract:
In structured and unstructured Peer-to-Peer (P2P) systems, frequent joining and leaving of peer nodes causes topology mismatch between the P2P logical overlay network and the physical underlay network. This topology mismatch problem generates high volumes of redundant traffic in the network. This paper presents Common Junction Methodology (CJM) to reduce network overhead by optimize the overlay traffic at underlay level. CJM finds common junction between available paths, and traffic is only routed through the common junction and not through the conventional identified paths. CJM does not alter
APA, Harvard, Vancouver, ISO, and other styles
36

Yang, Peng, and Lisong Xu. "On tradeoffs between cross-ISP P2P traffic and P2P streaming performance." Computer Networks 55, no. 18 (2011): 4033–42. http://dx.doi.org/10.1016/j.comnet.2011.07.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Liu, Xi Zi, and Ya Bin Xu. "Design of Peer-to-Peer Traffic Classification System Model Based on Cloud Computing." Applied Mechanics and Materials 182-183 (June 2012): 1347–51. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.1347.

Full text
Abstract:
The advantages and disadvantages of mainstream peer-to-peer (P2P) traffic classification technology in the current application are analyzed. As existing traffic classification tools fail to meet the super flow, as well as continuous increasing of network bandwidth, a cloud-based P2P traffic classification system model is proposed, which use the distributed parallel computing architecture named MapReduce based on hadoop.
APA, Harvard, Vancouver, ISO, and other styles
38

Zhang, Qiu Xia, and Chao Song. "Flow Measurement and Control System in the Campus Network." Advanced Materials Research 950 (June 2014): 327–32. http://dx.doi.org/10.4028/www.scientific.net/amr.950.327.

Full text
Abstract:
A campus network traffic monitoring and control systems, the use of P2P software as an application in the form of a new campus network, to break the existing information services on the Internet is mainly used in the client / server model, P2P applications can accurately identify the flow control device, on the campus network bandwidth rational planning and adjustment of P2P traffic bandwidth limitations and management, improve the quality of Internet users.
APA, Harvard, Vancouver, ISO, and other styles
39

Yan, Guang Hui, and Ming Hao Ai. "A Micro-Cluster-Based Data Stream Clustering Method for P2P Traffic Classification." Applied Mechanics and Materials 263-266 (December 2012): 1121–26. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1121.

Full text
Abstract:
Many machine learning techniques were proposed to classify P2P traffic and each with reasonable successes. But in the real P2P network environment, new communities of peers often attend and old communities of peers often leave. It requires the identification methods to be capable of coping with concept drift and updating the model incrementally. In this paper, we presented a concept-adapting algorithm MCStream which was based on streaming data mining techniques to identify P2P applications in Internet traffic. The MCStream used two micro-cluster structures, potential micro-cluster structures a
APA, Harvard, Vancouver, ISO, and other styles
40

Peng, Jian Fen, Xu Yan Tu, Hong Bing Wang, and Ya Jian Zhou. "An early Intelligent P2P Traffic Identification Method." Applied Mechanics and Materials 321-324 (June 2013): 2812–17. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2812.

Full text
Abstract:
In order to identify P2P traffic quickly and accurately as early as possible, an early intelligent P2P traffic identification method(EIIC) is proposed, which uses the size of early three packets payload and server port number obtained from the TCP flow as flow feature and classifies the traffic based on C4.5 algorithm. The results show that EIIC satisfies the following conditions: extracted features used, training samples selected under the unbiased conditions, it can be adaptive to actual network conditions and early classify the Internet traffic into application among WEB, MAIL, BitTorrent a
APA, Harvard, Vancouver, ISO, and other styles
41

Chen, Jian Hong, Jian Qing Xi, and Liang Shao. "A Network Expense Model for Improving P2P Data Distribution Schemes." Advanced Materials Research 255-260 (May 2011): 2087–90. http://dx.doi.org/10.4028/www.scientific.net/amr.255-260.2087.

Full text
Abstract:
Nowadays P2P is the premier data distribution technology which tops Internet traffic flow chart. It becomes more and more important to optimize the data flow of P2P traffic. However, there is no general standard for measuring which data distribution scheme is better. A network expense model is proposed for this purpose. By observing the data flows which are produced by P2P, we can calculate the network expense of any data distribution scheme. Now there is a unified standard for evaluating the influence of different data distribution schemes to the network. According to this model, the network
APA, Harvard, Vancouver, ISO, and other styles
42

Su, Shang-Chiuan, Yi-Ren Chen, Shi-Chun Tsai, and Yi-Bing Lin. "Detecting P2P Botnet in Software Defined Networks." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/4723862.

Full text
Abstract:
Software Defined Network separates the control plane from network equipment and has great advantage in network management as compared with traditional approaches. With this paradigm, the security issues persist to exist and could become even worse because of the flexibility on handling the packets. In this paper we propose an effective framework by integrating SDN and machine learning to detect and categorize P2P network traffics. This work provides experimental evidence showing that our approach can automatically analyze network traffic and flexibly change flow entries in OpenFlow switches th
APA, Harvard, Vancouver, ISO, and other styles
43

Gharib, Mohammed, Marzieh Malekimajd, and Ali Movaghar. "SLoPCloud: An Efficient Solution for Locality Problem in Peer-to-Peer Cloud Systems." Algorithms 11, no. 10 (2018): 150. http://dx.doi.org/10.3390/a11100150.

Full text
Abstract:
Peer-to-Peer (P2P) cloud systems are becoming more popular due to the high computational capability, scalability, reliability, and efficient data sharing. However, sending and receiving a massive amount of data causes huge network traffic leading to significant communication delays. In P2P systems, a considerable amount of the mentioned traffic and delay is owing to the mismatch between the physical layer and the overlay layer, which is referred to as locality problem. To achieve higher performance and consequently resilience to failures, each peer has to make connections to geographically clo
APA, Harvard, Vancouver, ISO, and other styles
44

Zhao, Jia, Jianfeng Guan, Changqiao Xu, Wei Su, and Hongke Zhang. "Information Exchange rather than Topology Awareness: Cooperation between P2P Overlay and Traffic Engineering." Mathematical Problems in Engineering 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/792563.

Full text
Abstract:
Solutions to the routing strategic conflict between noncooperative P2P overlay and ISP underlay go separate ways: hyperselfishness and cooperation. Unpredictable (possibly adverse) impact of the hyperselfish topology awareness, which is adopted in both overlay routing and traffic engineering, has not been sufficiently studied in the literature. Topology-related information exchange in a cooperatively efficient way should be highlighted to alleviate the cross-layer conflict. In this paper, we first illustrate the hyperselfish weakness with two dynamic noncooperative game models in which hyperse
APA, Harvard, Vancouver, ISO, and other styles
45

Bi, Xia-an, Xiaohui Wang, Luyun Xu, Sheng Chen, and Hong Liu. "Multilevel Bloom Filters for P2P Flows Identification Based on Cluster Analysis in Wireless Mesh Network." Discrete Dynamics in Nature and Society 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/801934.

Full text
Abstract:
With the development of wireless mesh networks and distributed computing, lots of new P2P services have been deployed and enrich the Internet contents and applications. The rapid growth of P2P flows brings great pressure to the regular network operation. So the effective flow identification and management of P2P applications become increasingly urgent. In this paper, we build a multilevel bloom filters data structure to identify the P2P flows through researches on the locality characteristics of P2P flows. Different level structure stores different numbers of P2P flow rules. According to the c
APA, Harvard, Vancouver, ISO, and other styles
46

Ma, Xiao Yu, and Fei Yan Chen. "A Design and Implementation of P2P Network Traffic Identification System." Advanced Materials Research 433-440 (January 2012): 5193–97. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.5193.

Full text
Abstract:
The P2P streaming media technology is popular and promising in recent years, to ensure the correctness of the identification method, and improve the identification rate and accuracy of the network traffic, this paper proposes a identification principle and algorithm of the P2P network traffic, and gives the overall structure of the system, Finally, puts up the system test environment. The experimental results show that the identification method of the network traffic proposed in this paper can effectively improve the identification rate and accuracy of the network traffic, the scheme has the v
APA, Harvard, Vancouver, ISO, and other styles
47

Hoang-Van, Hiep, Koki Mizutani, Takumi Miyoshi, and Olivier Fourmaux. "P2P Traffic Localization by Forcing Packet Loss." International Journal of Networked and Distributed Computing 1, no. 4 (2013): 251. http://dx.doi.org/10.2991/ijndc.2013.1.4.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Ansari, Md Sarfaraj Alam, Kunwar Pal, Mahesh Chandra Govil, Prajjval Govil, and Adarsh Srivastava. "Ensemble Machine Learning for P2P Traffic Identification." International Journal of Computing and Digital Systems 10, no. 1 (2021): 1305–23. http://dx.doi.org/10.12785/ijcds/1001117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Huang, Zhen, Ernst Biersack, and Yuxing Peng. "Reducing Repair Traffic in P2P Backup Systems." ACM Transactions on Storage 7, no. 3 (2011): 1–41. http://dx.doi.org/10.1145/2027066.2027070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Hong, Wei-ming. "A Novel Method for P2P Traffic Identification." Procedia Engineering 23 (2011): 204–9. http://dx.doi.org/10.1016/j.proeng.2011.11.2490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!