Implementation of P2P nodes detection based on decision tree

A P2P nodes detection method based on decision model was proposed by a long time of observation.As this method is a statistical analysis of the transport layer packet characteristics,identification of the network node for encrypted or unencrypted P2P applications is effective.Experiment shows that t...

Full description

Saved in:
Bibliographic Details
Main Authors: Yong-ping DONG, Xiang-zhan YU, Gang WU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2013-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.Z2.009/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539766575693824
author Yong-ping DONG
Xiang-zhan YU
Gang WU
author_facet Yong-ping DONG
Xiang-zhan YU
Gang WU
author_sort Yong-ping DONG
collection DOAJ
description A P2P nodes detection method based on decision model was proposed by a long time of observation.As this method is a statistical analysis of the transport layer packet characteristics,identification of the network node for encrypted or unencrypted P2P applications is effective.Experiment shows that this method has higher accuracy and lower false positive rate and false negative rate.
format Article
id doaj-art-d1b0706daf0749b2bbbe7cbcf5317e18
institution Kabale University
issn 1000-436X
language zho
publishDate 2013-09-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-d1b0706daf0749b2bbbe7cbcf5317e182025-01-14T06:42:10ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-09-0134404659677909Implementation of P2P nodes detection based on decision treeYong-ping DONGXiang-zhan YUGang WUA P2P nodes detection method based on decision model was proposed by a long time of observation.As this method is a statistical analysis of the transport layer packet characteristics,identification of the network node for encrypted or unencrypted P2P applications is effective.Experiment shows that this method has higher accuracy and lower false positive rate and false negative rate.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.Z2.009/P2Ptraffic identificationdecision treetraffic characteristic
spellingShingle Yong-ping DONG
Xiang-zhan YU
Gang WU
Implementation of P2P nodes detection based on decision tree
Tongxin xuebao
P2P
traffic identification
decision tree
traffic characteristic
title Implementation of P2P nodes detection based on decision tree
title_full Implementation of P2P nodes detection based on decision tree
title_fullStr Implementation of P2P nodes detection based on decision tree
title_full_unstemmed Implementation of P2P nodes detection based on decision tree
title_short Implementation of P2P nodes detection based on decision tree
title_sort implementation of p2p nodes detection based on decision tree
topic P2P
traffic identification
decision tree
traffic characteristic
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.Z2.009/
work_keys_str_mv AT yongpingdong implementationofp2pnodesdetectionbasedondecisiontree
AT xiangzhanyu implementationofp2pnodesdetectionbasedondecisiontree
AT gangwu implementationofp2pnodesdetectionbasedondecisiontree