Design & Performance Evaluation of a Bandwidth Shaper with Encrypted P2P Detection

Main Article Content

ธงชัย เจือจันทร์

Abstract

- Peer-to-peer (P2P) file sharing protocols have become popular among the Internet’s users. Due to the bandwidth-greediness of the P2P protocols, it is very significant for bandwidth shapers to detect and control them. Yet, P2P traffic encryption has been increasingly used to evade the detection. In our previous study, we have initially proposed an algorithm to detect and shape this encrypted P2P traffic. Although the previous algorithm could outperform the other proposed solution, it still has some drawbacks, namely over-penalty and minor fault negative problems. Hence, we propose in this paper an enhanced algorithm that can solve both weaknesses. The experiment has done on a test-bed to evaluate the enhanced algorithm. The results have demonstrated effectiveness and efficiency of the new algorithm.

Article Details

How to Cite
[1]
เจือจันทร์ ธ., “Design & Performance Evaluation of a Bandwidth Shaper with Encrypted P2P Detection”, JIST, vol. 1, no. 2, pp. 32–38, Dec. 2010.
Section
Research Article: Soft Computing (Detail in Scope of Journal)

References

1. BitTorrent, "BitTorrent protocol encryption." Vol. 2009, 2009.

2. D. Harrison and S. Shalunov, "BitTorrent Local Tracker Discovery Protocol," www.bittorrent.org, 2008.

3. P. Kirk, "Gnutella Protocol," rfcgnutella. sourceforge.net, 2003.

4. Kazaa, http://www.kazaa.com, 2009.

5. H. Kim, K. Claffy, M. Fomenkov, N. Brownlee, D. Barman, and M. Faloutsos, "Comparison of Internet Traffic Classification Tools", IMRG WACI, 2007.

6. A. Madhukar and C. Williamson, "A Longitudinal Study of P2P Traffic Classification," University of Calgary, 2005.

7. T. Chuachan and S. Puangpronpitag, "P2P Traffic Shaping by Checking Regular Expression and Learning Traffic Flow," National Computer Science and Engineering Conference Bangkok, Thailand, November 2009.

8. l7-filter, "http://l7-filter.sourceforge.net," 2009.

9. T. Karagiannis, K. Papagiannaki, and M. faloutsos, "Multilevel Traffic Classification in the dark," ACM SIGCOMM, Pennsylvania, 2005.

10. N. Wanchai, I. Chalermek, and T.-a. Yunyong, "Bittorrent peer identification based on behaviors of a choke algorithm," Proceedings of the 4th Asian Conference on Internet Engineering Pratunam, Bangkok, Thailand: ACM, 2008.

11. Azureus, http://azureus.sourceforge.net, 2007.

12. Bittorrent, http://www.bittorrent.com/, 2009.

13. netfilter, http://www.netfilter.org, 2009.