The explosion of P2P file sharing brings such serious problems as network congestion and traffic hindrance caused by excessive occupation of the bandwidth, including the hidden trouble in security. ISP and network operators need to manage P2P traffic to ensure the performance of traditional applications. To accomplish this goal, the system must first identify the P2P traffic. This paper describes the principal P2P traffic identification technologies and indicates the advantages and disadvantages of the P2P traffic identification methods. A variety of methods are combined to detect P2P flow more effectively. © Springer-Verlag Berlin Heidelberg 2012.
CITATION STYLE
Luo, Y. (2012). P2P network traffic identification technologies for internet. In Lecture Notes in Electrical Engineering (Vol. 127 LNEE, pp. 525–530). Springer Verlag. https://doi.org/10.1007/978-3-642-25769-8_74
Mendeley helps you to discover research relevant for your work.