The Community for Technology Leaders
Advances in P2P Systems, International Conference on (2009)
Sliema, Malta
Oct. 11, 2009 to Oct. 16, 2009
ISBN: 978-0-7695-3831-0
pp: 174-179
Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the performance of enterprise critical networked applications or network-based tasks or may overload the network infrastructure of Internet Service Providers, being desirable that this traffic be blocked in some situations. However, this task may be difficult to achieve, namely for networks operating at very high-speed bit rates and low latency and/or when the traffic is encrypted. This paper addresses the problem of detecting and blocking encrypted traffic generated by eMule, which is one of the most difficult to detect among popular peer-to-peer file sharing applications. The proposed method is based on eMule signatures, which are coded as SNORT rules, this system being used to detect and block eMule traffic. Experiments have been carried out to evaluate the proposed method. The contribution of the paper falls within peer-to-peer security or within legal and regulatory issues.
peer-to-peer file sharing applications, eDonkey Network, traffic identification and classification, deep packet inspection, peer-to-peer security, legal and regulatory issues
Mário M. Freire, Manuela Pereira, David A. Carvalho, "Detection of Encrypted Traffic in eDonkey Network through Application Signatures", Advances in P2P Systems, International Conference on, vol. 00, no. , pp. 174-179, 2009, doi:10.1109/AP2PS.2009.35
75 ms
(Ver 3.3 (11022016))