{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:03:22Z","timestamp":1743152602118,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":37,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387097503"},{"type":"electronic","value":"9780387097510"}],"license":[{"start":{"date-parts":[[2009,10,15]],"date-time":"2009-10-15T00:00:00Z","timestamp":1255564800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,10,15]],"date-time":"2009-10-15T00:00:00Z","timestamp":1255564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-0-387-09751-0_44","type":"book-chapter","created":{"date-parts":[[2010,1,23]],"date-time":"2010-01-23T01:48:46Z","timestamp":1264211326000},"page":"1231-1252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Nature of Peer-to-Peer Traffic"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o V. P.","family":"Gomes","sequence":"first","affiliation":[]},{"given":"Pedro R. M.","family":"In\u00e1cio","sequence":"additional","affiliation":[]},{"given":"M\u00e1rio M.","family":"Freire","sequence":"additional","affiliation":[]},{"given":"Manuela","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Paulo P.","family":"Monteiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,10,15]]},"reference":[{"key":"44_CR1","unstructured":"BBC iPlayer. URL http:\/\/www.bbc.co.uk\/iplayer\/ . Last access at August 20th, 2008"},{"key":"44_CR2","unstructured":"Dailymotion \u2013 Share Your Videos. URL http:\/\/www.dailymotion.com. Last access at August 8th, 2008"},{"key":"44_CR3","unstructured":"Joost \u2013 Free online TV . URL http:\/\/www.joost.com. Last access at August 20th, 2008"},{"key":"44_CR4","unstructured":"Miro \u2013 free, open source internet tv and video player. URL http:\/\/www.getmiro.com . Last access at August 20th, 2008"},{"key":"44_CR5","unstructured":"NetPDL Language Specification. URL http:\/\/www.nbee.org\/doku.php?id=netpdl:index. Last access at August 7th, 2008"},{"key":"44_CR6","unstructured":"Snort \u2013 the de facto standard for intrusion detection\/prevention. URL http:\/\/www.snort.org. Last access at November 30th, 2008"},{"key":"44_CR7","unstructured":"The NetBee Library. URL http:\/\/www.nbee.org\/doku.php. Last access at August 7th, 2008"},{"key":"44_CR8","unstructured":"Wireshark: Go deep. URL http:\/\/www.wireshark.org. Last access at August 7th, 2008"},{"key":"44_CR9","unstructured":"YouTube \u2013 Broadcast Yourself. URL http:\/\/www.youtube.com. Last access at August 8th, 2008"},{"issue":"2","key":"44_CR10","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1129582.1129589","volume":"36","author":"L. Bernaille","year":"2006","unstructured":"Bernaille, L., Akodkenou, I., Soule, A., Salamatian, K.: Traffic Classification On The Fly. ACM SIGCOMM Computer Communication Review 36 (2), 23\u201326 (2006)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"44_CR11","unstructured":"Blau, J.: Europe Looks for a Peer-to-Peer TV Alternative (2008). URL http:\/\/www.spectrum.ieee.org\/apr08\/6119. Last access at June 26th, 2008"},{"key":"44_CR12","first-page":"37","volume-title":"Proceedings of the ACM SIGCOMM 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications","author":"D. Bonfiglio","year":"2007","unstructured":"Bonfiglio, D., Mellia, M., Meo, M., Rossi, D., Tofanelli, P.: Revealing Skype Traffic: When Randomness Plays with You. In: Proceedings of the ACM SIGCOMM 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 37\u201348. ACM Press, New York, NY, USA (2007)"},{"key":"44_CR13","unstructured":"Constantinou, F., Mavrommatis, P.: Identifying Known and Unknown Peer-to-Peer Traffic. In: Proceedings of Fifth IEEE International Symposium on Network Computing and Applications, pp. 93\u2013102 (2006)"},{"key":"44_CR14","unstructured":"Crawshaw, J.: Deep Packet Inspection: Taming the P2P Traffic Beast. Ligth Reading Insider 6 (7) (2006)"},{"key":"44_CR15","unstructured":"Dhamankar, R., King, R.: Protocol Identification via Statistical Analysis (PISA). White Paper, Tipping Point (2007)"},{"key":"44_CR16","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1145\/1242572.1242692","volume-title":"Proceedings of the 16th International Conference on World Wide Web","author":"J. Erman","year":"2007","unstructured":"Erman, J., Mahanti, A., Arlitt, M., Williamson, C.: Identifying and Discriminating Between Web and Peer-to-Peer Traffic in the Network Core. In: Proceedings of the 16th International Conference on World Wide Web, pp. 883\u2013892. ACM Press New York, NY, USA (2007)"},{"key":"44_CR17","unstructured":"Finnish Communications Regulatory Authority : Decision of the Finnish Communications Regulatory Authority on Compliance with Law of the Sonera Puhekaista Service (2003). URL http:\/\/www.ficora.fi\/attachments\/englanti\/1156489127354\/Files%\/CurrentFile\/SoneraPuhekaista.pdf. Last access at August 2nd, 2008"},{"key":"44_CR18","volume-title":"National Cable & Telecommunications Association (NCTA) 2003","author":"A. Gerber","year":"2003","unstructured":"Gerber, A., Houle, J., Nguyen, H., Roughan, M., Sen, S.: P2P The Gorilla in the Cable. In: National Cable & Telecommunications Association (NCTA) 2003 National Show. Chicago, IL (2003)"},{"key":"44_CR19","unstructured":"Gomes, J., Incio, P., Freire, M., Pereira, M., Monteiro, P.: Capturing the Nature of Peer-to-Peer Traffic Using Fast Entropy Analysis. Submitted for publication"},{"key":"44_CR20","doi-asserted-by":"crossref","unstructured":"Gomes, J., Incio, P., Freire, M., Pereira, M., Monteiro, P.: Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy. In: Proceedings of the IPCCC 2008, IEEE International Performance Computing and Communications Conference (2008)","DOI":"10.1109\/PCCC.2008.4745138"},{"key":"44_CR21","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/HICSS.2008.436","volume-title":"Proceedings of the 41st Hawaii International Conference on System Sciences","author":"M.E. Johnson","year":"2008","unstructured":"Johnson, M.E., McGuire, D., Willey, N.D.: The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users. In: Proceedings of the 41st Hawaii International Conference on System Sciences, pp. 383\u2013383. IEEE Press, Waikoloa, HI, USA (2008)"},{"key":"44_CR22","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Broido, A., Brownlee, N., Claffy, K., Faloutsos, M.: Is P2P Dying or Just Hiding. In: Proceedings of the IEEE GLOBECOM \u201904 Global Telecommunications Conference, vol. 3, pp. 1532\u20131538 (2004)","DOI":"10.1109\/GLOCOM.2004.1378239"},{"key":"44_CR23","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/1028788.1028804","volume-title":"Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement","author":"T. Karagiannis","year":"2004","unstructured":"Karagiannis, T., Broido, A., Faloutsos, M.: Transport Layer Identification of P2P Traffic. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 121\u2013134. ACM Press New York, NY, USA, Taormina, Sicily, Italy (2004)"},{"key":"44_CR24","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1145\/1080091.1080119","volume-title":"Proceedings of the ACM SIGCOMM \u201905 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications","author":"T. Karagiannis","year":"2005","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: Multilevel Traffic Classification in the Dark. In: Proceedings of the ACM SIGCOMM \u201905 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, vol. 35, pp. 229\u2013240. ACM Press New York, NY, USA, Philadelphia, Pennsylvania, USA (2005)"},{"key":"44_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1330107.1330115","volume-title":"Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement","author":"T. Karagiannis","year":"2005","unstructured":"Karagiannis, T., Rodriguez, P., Papagiannaki, K.: Should Internet Service Providers Fear Peer-assisted Content Distribution? In: Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, pp. 1\u201314. ACM, New York, NY, USA (2005)"},{"key":"44_CR26","unstructured":"Korpi, S.: Internet Telephony \u2013 Security Issues in Skype. Mobile Communities, Seminar on Internetworking (2006). Telecommunications Software and Multimedia Laboratory, Helsinki University of Technology"},{"key":"44_CR27","unstructured":"Lehtinen, J.: Design and Implementation of Mobile Peer-to-Peer Application. Master\u2019s thesis, Helsinki University of Technology (2006)"},{"key":"44_CR28","unstructured":"Madhukar, A., Williamson, C.: A Longitudinal Study of P2P Traffic Classification . In: Proceedings of 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, pp. 179\u2013188 (2006)"},{"key":"44_CR29","volume-title":"Proceedings of the 6th International Workshop in Passive and Active Network Measurement","author":"A. Moore","year":"2005","unstructured":"Moore, A., Papagiannaki, K.: Toward the Accurate Identification of Network Applications. In: Proceedings of the 6th International Workshop in Passive and Active Network Measurement. Springer, Boston, MA, USA (2005)"},{"issue":"7","key":"44_CR30","doi-asserted-by":"publisher","first-page":"36","DOI":"10.4304\/jcm.1.7.36-46","volume":"1","author":"M. Per\u00e9nyi","year":"2006","unstructured":"Per\u00e9nyi, M., Dang, T., Gefferth, A., Molnr, S.: Identification and Analysis of Peer-to-Peer Traffic. Journal of Communications 1 (7), 36\u201346 (2006)","journal-title":"Journal of Communications"},{"issue":"1","key":"44_CR31","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/1111322.1111339","volume":"36","author":"P. Rodriguez","year":"2006","unstructured":"Rodriguez, P., Tan, S.M., Gkantsidis, C.: On the Feasibility of Commercial, Legal P2P Content Distribution. SIGCOMM Computer Communication Review 36 (1), 75\u201378 (2006)","journal-title":"SIGCOMM Computer Communication Review"},{"key":"44_CR32","unstructured":"Sabbagh, D.: BBC iPlayer \u2018risks overloading the internet\u2019 (2008). URL http:\/\/technology.timesonline.co.uk\/tol\/news\/tech_and_web\/art%icle3716781.ece. Last access at August 20th, 2008"},{"key":"44_CR33","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1145\/988672.988742","volume-title":"Proceedings of the 13th Conference on World Wide Web","author":"S. Sen","year":"2004","unstructured":"Sen, S., Spatscheck, O., Wang, D.: Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures. In: Proceedings of the 13th Conference on World Wide Web, pp. 512\u2013521. ACM Press New York, NY, USA (2004)"},{"issue":"2","key":"44_CR34","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TNET.2004.826277","volume":"12","author":"S. Sen","year":"2004","unstructured":"Sen, S., Wang, J.: Analyzing Peer-to-Peer Traffic Across Large Networks. IEEE\/ACM Transactions on Networking 12 (2), 219\u2013232 (2004)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"3","key":"44_CR35","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: A Mathematical Theory of Communication. The Bell System Technical Journal 27 (3), 379\u2013423 (1948)","journal-title":"The Bell System Technical Journal"},{"key":"44_CR36","doi-asserted-by":"crossref","unstructured":"Xie, H., Yang, Y.R., Silberschatz, A.: Towards ISP-Compliant, Peer-Friendly P2P Design . In: Proceedings of The IFIP International Federation for Information Processing Networking, pp. 375\u2013384 (2008)","DOI":"10.1007\/978-3-540-79549-0_33"},{"key":"44_CR37","volume-title":"High Speed Deep Packet Inspection with Hardware Support. Ph.D. thesis","author":"F. Yu","year":"2006","unstructured":"Yu, F.: High Speed Deep Packet Inspection with Hardware Support. Ph.D. thesis, University of California, Berkeley (2006)"}],"container-title":["Handbook of Peer-to-Peer Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09751-0_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T23:09:07Z","timestamp":1739747347000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-0-387-09751-0_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,15]]},"ISBN":["9780387097503","9780387097510"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09751-0_44","relation":{},"subject":[],"published":{"date-parts":[[2009,10,15]]},"assertion":[{"value":"15 October 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}