期刊文献+

基于应用层签名的P2P流媒体流量识别 被引量:7

Identification of P2P streaming traffic using application signatures
下载PDF
导出
摘要 通过对P2P流量识别技术现状的研究,提出了基于应用层签名的P2P流媒体流量识别方法。分析和提取了五种主流P2P流媒体平台的应用层签名特征,并通过实验验证了基于应用层签名的P2P流媒体流量识别方法的有效性。 This paper surveyed the current P2P traffic identification technology and proposed a novel method using application signature to identify P2P streaming traffic. Analyzed and extracted features of application signatures for five representative P2P streaming platforms. The identification result shows the effectiveness of the proposed method.
出处 《计算机应用研究》 CSCD 北大核心 2009年第6期2214-2216,共3页 Application Research of Computers
基金 国家"863"计划资助项目(2008AA01Z407) 湖南省自然科学基金资助项目(07JJ4018) 武器装备预研基金资助项目(9140A15070108KG01)
关键词 P2P流媒体 应用层签名 流量识别 P2P streaming application signature traffic identification
  • 相关文献

参考文献9

  • 1SEN S, SPATSCHECK O, WANG Dong-mei. Accurate, scalable innetwork identification of P2P traffic using application signatures [C]//Proc of the 13th International Conference on WWW. New York :ACM Press,2004:512-521.
  • 2SEN S, WANG Jia. Analyzing peer-to-peer traffic across large networks [ C ]//Proc of ACM SIGCOMM Internet Measurement Workshop. Piscataway, NJ : IEEE Press,2002:219-232.
  • 3KARAGIANNIS T, BROIDO A, FALOUTSOS M. Transport layer identification of P2P traffic [ C ]//Proc of the 4th ACM SIGCOMM Conference on Intemet Measurement. New York: ACM Press, 2004: 121-134.
  • 4OHZAHATAI S, HAGIWARAI Y, TERADAI M, et al. A traffic identification method and evaluations for a pure P2P application [ C ]//Proc of Passive and Active Measurement. Berlin:Springer-Verlag, 2005:55-68.
  • 5CONSTANTINOU F,MAVROMMATIS P. Identifying known and unknown peer-to-peer traffic [ C ]//Proc of the 5th IEEE International Symposium on Network Computing and Applications. Los Alamitos, CA : IEEE Computer Society ,2006:93-102.
  • 6DEDINSKI I,MEER H, HAN L,et al. Cross-layer peer-to-peer traffic identification and optimization based on active networking[ C ]//Proc of the 7th Annual International Working Conference on Active and Programmable Networks. 2005 : 13-27.
  • 7杨岳湘,王锐,唐川,李强.基于双重特征的P2P流量检测方法[J].通信学报,2006,27(z1):134-139. 被引量:8
  • 8KARAGIANNIS T, BROIDO A, BROWNLEE N,et al. Is P2P dying or just hiding [ C ]//Proc of GIOBECOM 2004. Dallas, TX: IEEE Press,2004 : 1532 -1538.
  • 9WON Y J, PARK B C, JU H T, et al. A hybrid approach for accurate application traffic identification [ C ]//Proc of E2EMON'06.2006 : 1-8.

二级参考文献8

  • 1[1]CACHELOGIC.http://www.cachelogic.com.
  • 2[2]KARAGIANNIS T,BROIDO A,et al.Is P2P dying or just hiding[A].GLOBECOM'04[C],Dallas,TX,USA,2004.
  • 3[3]SEN S,SPATSCHECK O,WANG D M.Accurate scalable innetwork identification of P2P traffic using application signatures[A].WWW2004[C].New York,USA,2004.
  • 4[4]ROUGHAN M,SEN S,et al.Class-of-service mapping for qos:a statistical signature-based approach to ip traffic classification[A].IMC'04[C].Proc of the 4th ACM SIGCOMM conference on Intemet measurement,New York,NY,USA,2004.135-148.
  • 5[5]CONSTANTINOU F,MAVROMMATICS P,Identifying Known and Unknown Peer-to-Peer Traffic,2005.
  • 6[6]KARAGIANNIS T,BROIDO A,FALOUTSOS M.Transport layer identification of P2P traffic[A].Proc of the 4th ACM SIGCOMM conference on Internet measurement[C].New York,US A,2004.121-134.
  • 7[7]KIM M S,KANG H J,HONG J W.Towards peer-to-peer traffic analysis using flows[A].Lecture Notes in Computer Science,Springer[C].Heidelberg,Germany,2003,55-67.
  • 8[8]IPTABLES.TUTORIALhttp://iptables-tutorial.frozentux.net/iptablestutorial.html#UDPCONNECTIONS

共引文献7

同被引文献67

  • 1杨岳湘,王锐,唐川,李强.基于双重特征的P2P流量检测方法[J].通信学报,2006,27(z1):134-139. 被引量:8
  • 2陈亮,龚俭,徐选.基于特征串的应用层协议识别[J].计算机工程与应用,2006,42(24):16-19. 被引量:43
  • 3石萍,陈贞翔,荆山,贾冠昕,杨波.基于对等特征的P2P流量识别方法[J].中国教育网络,2007(2):36-38. 被引量:9
  • 4KIM M S, KANG H J, HONG J W. Towards peer-to-peer traffic a-, nalysis using flows[ C]//Self-Managing Distributed Systems, LNCS 2867. Berlin: Springer, 2004:55 - 67.
  • 5OHZAHATA S, HAGIWARAL Y, TERADAL M. A traffic identification method and evaluations for a pure P2P application[ C]//Passive and Active Measurement, LNCS 3431. Heidelberg: Springer- Verlag, 2005:55 -68.
  • 6WANG J S, HANG Y, WU Q. Connection pattern-based P2P application identification characteristic[ C]//Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops. Washington, DC: IEEE Computer Society, 2007:437 -441.
  • 7LU X, DUAN H X, LI X. Identification of P2P traffic based on the content redistribution characteristic[ C]// Communications and Information Technologies. Washington, DC: IEEE Computer Society, 2007:596-601.
  • 8CONSTANTINOU F, MAVROMMATIS P. Identifying known and unknown peer-to-peer traffic[ C]// The 15th IEEE International Symposium on Network Computing and Applications. Washington, DC: IEEE Computer Society, 2006:93 - 102.
  • 9KARAGIANNIS T, BROIDO A, FALOUYSOS M. Transport layer identification of P2P traffic[ C]// Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement. New York: ACM, 2004:121 - 134.
  • 10KARAGIANNIS T, PAPAGIANNAKI K, FALOUTSOS M. Blinc: multilevel traffic classification in the dark[ J]. ACM SIGCOMM Comprter Communication Review, 2005,35(4): 229-240.

引证文献7

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部