• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 10 (3), 2011
  3. 565-572
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2011 | Volume: 10 | Issue: 3 | Page No.: 565-572
DOI: 10.3923/itj.2011.565.572

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 209

Authors


Lin Ye

Country: China

Hongli Zhang

Country: China

Qiang Dai

Country: China

Keywords


  • P2P
  • identification
  • DHT
  • behavior
  • pattern
Research Article

Identifying P2P Application with DHT Behaviors

Lin Ye, Hongli Zhang and Qiang Dai
Since, the emergence of peer-to-peer applications, their traffic has gradually become the dominant component on some links, which has a significant impact on the underlying infrastructure, such as internet topology, routing systems and network strategies. It is necessary to make some adjustments in design for future, which first needs accurate identification of P2P traffic. In this study, we focus on the explicit behaviors of Distributed Hash Tables (DHT), which are deployed widely in different P2P applications. Therefore, we develop a systematic methodology to identify P2P hosts in a statistical way, i.e., based on behavior patterns of DHT functions. We analyze four representative behaviors in the view of functions, including bootstrap pattern, routing pattern, diversity pattern and short-session pattern. Actually, it is proved that these behaviors are very different from traditional applications in pattern through a series of detailed experiments. At last a novel algorithm that relies on behavior patterns of DHT is proposed. Our experiment results show that we are able to identify more than 90% of P2P hosts with at least 95% accuracy and also can deal with the silent clients, which figures out the identification in a new aspect.
PDF Fulltext XML References Citation

How to cite this article

Lin Ye, Hongli Zhang and Qiang Dai, 2011. Identifying P2P Application with DHT Behaviors. Information Technology Journal, 10: 565-572.

DOI: 10.3923/itj.2011.565.572

URL: https://scialert.net/abstract/?doi=itj.2011.565.572

Related Articles

Research and Improvement of Unstructured P2P Super-Peer Topology and Search Technique
An Anonymous Authentication Scheme Based on Fully Homomorphic Encryption in P2P Networks
A Multi-Channel Multimedia Content Distribution Strategy using Multiple Description Coding
Fair Blind Signature Based Authentication for Super Peer P2P Network
Resource Occupation of Peer-to-Peer Multicasting

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved