A preliminary investigation on the identification of peer to peer network applications

Loading...
Publication Logo

Date

2015

Authors

Can Bozdogan
Yasemin Gokcen
Ibrahim Zincir

Journal Title

Journal ISSN

Volume Title

Publisher

Association for Computing Machinery Inc acmhelp@acm.org

Open Access Color

Green Open Access

No

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Average
Influence
Average
Popularity
Average

Research Projects

Journal Issue

Abstract

Identification of P2P (peer to peer) applications inside network traffic plays an important role for route provisioning traffic policing flow prioritization network service pricing network capacity planning and network resource management. Inspecting and identifying the P2P applications is one of the most important tasks to have a network that runs efficiently. In this paper we focus on identification of different P2P applications. To this end we explore four commonly used supervised machine learning algorithms as C4.5 Ripper SVM(Support Vector Machines) Naïve Bayesian and well known unsupervised machine learning algorithm K-Means on four different datasets. We evaluate their performances to identify the P2P applications that each traffic flow belongs to. Evaluations show that Ripper algorithm gives better results than the others. © 2017 Elsevier B.V. All rights reserved.

Description

Keywords

Network Traffic Classification, P2p Applications, Peer To Peer, Supervised And Unsupervised Machine Learning, Artificial Intelligence, Distributed Computer Systems, Evolutionary Algorithms, Learning Algorithms, Learning Systems, Supervised Learning, Support Vector Machines, Telecommunication Traffic, Network Capacity Planning, Network Resource Management, Network Traffic Classification, P2p (peer To Peer), P2p Applications, Peer To Peer, Supervised Machine Learning, Unsupervised Machine Learning, Peer To Peer Networks, Artificial intelligence, Distributed computer systems, Evolutionary algorithms, Learning algorithms, Learning systems, Supervised learning, Support vector machines, Telecommunication traffic, Network capacity planning, Network resource management, Network traffic classification, P2P (peer to peer), P2P applications, Peer to peer, Supervised machine learning, Unsupervised machine learning, Peer to peer networks, Network Traffic Classification, P2P Applications, Peer to Peer, Supervised and Unsupervised Machine Learning

Fields of Science

0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology

Citation

WoS Q

Scopus Q

OpenCitations Logo
OpenCitations Citation Count
4

Source

17th Genetic and Evolutionary Computation Conference GECCO 2015

Volume

Issue

Start Page

883

End Page

888
PlumX Metrics
Citations

CrossRef : 4

Scopus : 4

Captures

Mendeley Readers : 7

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
0.8629

Sustainable Development Goals