期刊文献+

基于半监督学习的P2P协议识别 被引量:4

P2P classification using semi-supervised learning
下载PDF
导出
摘要 随着P2P技术的发展,网络上充满了大量的P2P应用。协议加密技术的发展,使得P2P应用的识别和管理变得非常困难。描述了如何运用半监督的机器学习理论,根据传输层的特征,用聚类算法训练数据并建立一个高效的在线协议识别器,用于在内核协议层对协议特别是P2P协议进行识别,并对BitComet和Emule进行了实验,得到了很高的识别准确率(80%)。研究并解决了将选取好的特征用于聚类并高效地实现最后的协议识别器。 P2P classification is important for the ISP services and network administrators these years, as the fluent new P2P applications.The traditional identification skills such as port based and payload based technologies can't classify any protocols now, especially the encrypted protocols. A semi-supervised clustering based classification model is used for P2P application identification. The classification accuracy and the system's activity is mainly discussed. The feature selection and online classification are what the paper concentrates on.
作者 谭炜 吴健
出处 《计算机工程与设计》 CSCD 北大核心 2009年第2期291-293,369,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2007AA010601)
关键词 协议识别 半监督学习 聚类 协议加密 P2P 在线识别 protocol identification semi-supervised learning clustering encrypted protocol P2P online identification
  • 相关文献

参考文献8

  • 1Erman J,Arlitt M,Mahanti A.Traffic classification using clustering algorithms[C].Pisa, Italy:SIGCOMM MineNet Workshop, 2006.
  • 2Basu S, Bilenko M, Mooney R. A probabilistic framework for semi-supervised clustering [C]. Seattle, USA: Proc KDD, 2004: 59-68.
  • 3Bemaille L, Teixeira R, Salamatian K.Early application identi cation[C]. Lisboa,Portugal:CoNEXT,2006.
  • 4Cache Logic.Peer-to-peer in 2005[EB/OL].http://www. cachelogic.com/home/pages/research/p2p2005.php,2005.
  • 5Chapelle O,Scholkopf B,Zien A.Semi-supervised learning[M]. Cambridge,USA:MIT Press,2006:28-45.
  • 6Jeffrey Erman,Anirban Mahanti,Martin Arlitty.Offiine/realtime traffic classification using semi-supervised leaming[R].University of Calgary, Department of Computer Science,2007.
  • 7Estan C, Keys K, Moore D, et al. Building a better netflow [C]. Portland,USA:SIGCOMM,2004.
  • 8Karagiannis T, Papagiannaki K,Faloutsos M.BLINC:Multilevel ira f_c classi_cation in the dark[C].Philadelphia USA:SIGCOMM,2005.

同被引文献31

  • 1陈亮,龚俭,徐选.基于特征串的应用层协议识别[J].计算机工程与应用,2006,42(24):16-19. 被引量:43
  • 2胡旺,李志蜀.一种更简化而高效的粒子群优化算法[J].软件学报,2007,18(4):861-868. 被引量:333
  • 3温超,郑雪峰,戚翔,于真.基于流量分析的P2P协议识别方法的研究[J].微计算机应用,2007,28(7):714-717. 被引量:7
  • 4Zander S, Nguyen T, Armitage G. Automated traffic classification and application identification using machine learning[ C]// Proceedings of the IEEE Conference on Local Computer Networks- 30th Anniversary. [ s. l. ]: IEEE Computer Society, 2005: 250 - 257.
  • 5Kim MS, Won Y J,Hong J W K: Application level traffic monitoring and analysis on IP networks [ J ]. ETRI Journal, 2005,27 (1):22-41.
  • 6Dreger H, Feldmann A, Mai M,et al. Dynamic Application- Layer Protocol Analysis for Network Intrusion Detection[ C]// Proeeedings of USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2006: 257 - 272.
  • 7McGregor A, Hall M, Lorier P, et al. Flowclustering using machine learning techniques[C]//International Workshop on Passive and Active Network Meauremeat. Berlin: Springer, 2004: 22 - 41.
  • 8孙海波.基于协议行为特征的协议识别方法[C]//全国网络与信息安全技术研讨会论文集(上册).北京:中国通信学会,2007:245-251.
  • 9Woo Kyoung - Gu, Lee Jeong - Hoon, Kim Myoung - Ho, et al. FINDIT:a fast and intelligent subspace clustering algoritlun using dimension voting[J]. Information and software technology,2004,46:255 -271.
  • 10Basu S, Bilenko M, Mooney R J. A Probabilistic Framework for Semi - Supervised Clustering [ C]//Proceeding of Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining ( KDD - 2004 ). Seattle, WA, USA: ACM,2004:59 - 68.

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部