Identifying P2P Network Activities on Encrypted Traffic.
Xiaolei WangJie HeYuexiang YangPublished in: TrustCom (2014)
Keyphrases
- peer to peer
- internet traffic
- network traffic
- traffic analysis
- telecommunication networks
- unstructured peer to peer
- peer to peer systems
- network resources
- computer networks
- bandwidth usage
- network traffic monitoring
- traffic load
- distributed network
- file sharing
- peer to peer networks
- resource utilization
- bandwidth consumption
- transportation networks
- network conditions
- congestion control
- overlay network
- complex networks
- network management
- intrusion detection
- atm networks
- activity recognition
- dos attacks
- cellular networks
- ddos attacks
- traffic data
- small world
- traffic volume
- intermediate nodes
- digital libraries
- ip addresses
- fully distributed
- traffic engineering
- load balancing
- traffic light
- traffic management
- network structure