Title :
Non-intrusive Identification of Peer-to-Peer Traffic
Author :
Ulliac, Alexis ; Ghita, Bogdan V.
Author_Institution :
Centre for Security, Commun., & Network Res., Univ. of Plymouth, Plymouth, UK
Abstract :
Peer-to-peer protocols are increasingly implementing encryption and port randomisation to circumvent detection by traditional, signature-based classification systems. This paper proposes a novel method of identifying hosts and connections generating peer-to-peer traffic by observing the statistical attributes of the traffic. The method builds on existing statistical-based detection, but it uses a two-stage neural network to process the data and identify the peer-to-peer connections. A full architecture is also proposed to link the detection with a module producing ACL rules allowing segregating and blocking or shaping the peer-to-peer traffic in real time. The method was tested on real traffic, achieving accuracy between 85% and 98% at detecting peer-to-peer traffic from two packet traces.
Keywords :
Communication system security; Cryptography; Payloads; Peer to peer computing; Protocols; Quality of service; Reliability theory; Statistical analysis; Telecommunication network reliability; Telecommunication traffic; Networking; peer-to-peer detection; supervised neural network;
Conference_Titel :
Communication Theory, Reliability, and Quality of Service (CTRQ), 2010 Third International Conference on
Conference_Location :
Athens, TBD, Greece
Print_ISBN :
978-1-4244-7273-4
DOI :
10.1109/CTRQ.2010.27