Inferring undesirable behavior from P2P traffic analysis