Retraining Mechanism for On-Line Peer-to-Peer Traffic Classification

Author(s):  
Roozbeh Zarei ◽  
Alireza Monemi ◽  
Muhammad Nadzir Marsono
10.28945/2565 ◽  
2002 ◽  
Author(s):  
Griff Richards ◽  
Rory McGreal ◽  
Norm Friesen

Repositories provide mechanisms to encourage the discovery, exchange and re-use of learning objects. This paper describes Portals for On-line Objects in Learning (POOL), a consortium project of the TeleLearning NCE to build a learning object repository scalable to the national level. Funded in part by the Canarie Learning Program, POOL contributes to the development of two focal technologies: “POOL POND and SPLASH” a distributed architecture for a peer-to-peer network of learning object repositories, and CanCore, a practical metadata protocol for cataloguing learning objects.


Author(s):  
Bushra Mohammed Ali Abdalla ◽  
Haitham A. Jamil ◽  
Mosab Hamdan ◽  
Joseph Stephen Bassi ◽  
Ismahani Ismail ◽  
...  

Author(s):  
Marta Ruiz Costa-jussà ◽  
Lluis Formiga ◽  
Oriol Torrillas ◽  
Jordi Petit ◽  
José Adrián Rodríguez Fonollosa

<p>This paper describes the design, development and analysis of a MOOC entitled “Approaches to Machine Translation: rule-based, statistical and hybrid” providing lessons learnt on conclusions to be take into account in the future. The course was developed within a Canvas platform, used by recognized European universities. The course contains video-lectures, quizzes and laboratory assignments. Evaluation is done across on-line quizzes, programming assignments (PAs) evaluated by means of a specific code evaluation and peer-to-peer strategies. This MOOC allows to introduce people from various areas to the Machine Translation theory and practice. It also allows to internationally publisize different tools developed at the Universitat Polit`ecnica de Catalunya.</p>


2008 ◽  
Vol 17 (01) ◽  
pp. 1-51 ◽  
Author(s):  
ZHONGQIANG CHEN ◽  
ALEX DELIS ◽  
PETER WEI

Sessions generated by Instant Messaging and Peer-to-Peer systems (IM/P2Ps) not only consume considerable bandwidth and computing resources but also dramatically change the characteristics of data flows affecting both the operation and performance of networks. Most IM/P2Ps have known security loopholes and vulnerabilities making them an ideal platform for the dissemination of viruses, worms, and other malware. The lack of access control and weak authentication on shared resources further exacerbates the situation. Should IM/P2Ps be deployed in production environments, performance of conventional applications may significantly deteriorate and enterprise data may be contaminated. It is therefore imperative to identify, monitor and finally manage IM/P2P traffic. Unfortunately, this task cannot be easily attained as IM/P2Ps resort to advanced techniques to hide their traces including multiple channels to deliver services, port hopping, message encapsulation and encryption. In this paper, we propose an extensible framework that not only helps to identify and classify IM/P2P-generated sessions in real time but also assists in the manipulation of such traffic. Consisting of four modules namely, session manager, traffic assembler, IM/P2P dissector, and traffic arbitrator, our proposed framework uses multiple techniques to improve its traffic classification accuracy and performance. Through fine-tuned splay and interval trees that help organize IM/P2P sessions and packets in data streams, we accomplish stateful inspection, traffic re-assembly, data stream correlation, and application layer analysis that combined will boost the framework's identification precision. More importantly, we introduce IM/P2Ps "plug-and-play" protocol analyzers that inspect data streams according to their syntax and semantics; these analyzers render our framework easily extensible. Identified IM/P2P sessions can be shaped, blocked, or disconnected, and corresponding traffic can be stored for forensic analysis and threat evaluation. Experiments with our prototype show high IM/P2Ps detection accuracy rates under diverse settings and excellent overall performance in both controlled and real-world environments.


Sign in / Sign up

Export Citation Format

Share Document