期刊文献+

P2P流量识别方法比较研究 被引量:1

Comparison Survey on the P2P Traffic Identification
下载PDF
导出
摘要 P2P(peer-to-peer,对等体网络)技术在飞速发展的同时,占用大量网络可用带宽,并采用随机端口,数据加密和协议伪装等技术来逃避检测。因此需要一种健壮、高效的P2P流量检测方法。文章分析了4种典型的P2P流量识别方法的原理,从准确性、实时性和健壮性3个方面进行了性能比较。最后提出一种基于协议指纹的新型P2P流分类方案,并对P2P流量分类技术的发展提出了看法。 The fast progress of P2P (peer-to-peer)technology brings about Internet available band- width largely occupied, and many current P2P applications use several obfuscation techniques to a- void detection, including dynamic port numbers, encrypted payloads and protocol masquerading, therefore, a :robust and effective identification method was needed. This paper analyzed four typical methods of P2P traffic identification,then made a comparison of their performance from three aspects on accuracy, peculiarity of real-time and robustness. Finally,this paper presented a novel P2P traffic identification scheme based on the protocol fingerprints and gave some view about the evolution of P2P traffic identification.
出处 《信息工程大学学报》 2009年第2期275-279,共5页 Journal of Information Engineering University
基金 国家863计划资助项目(2007AA01Z2A1)
关键词 P2P 流量识别 协议指纹 协议指纹库 P2P(peer-to-peer) traffic identification protocol fingerprint protocol fingerprint pro-file
  • 相关文献

参考文献14

  • 1Sen S,Wang J. Analyzing peer-to-peer traffic across 1 arge networks [C]//Proceedings of ACM SIGCOMM lnternet Measurement Workshop. 2002 : 137 - 150.
  • 2Alok Madhukar,Carey Williamson. A Longitudinal Study of P2P Traffic Classification [ C ]//Department of Computer Science University of Calgary. 2005:179 - 188.
  • 3Subhabrata Sen, Oliver Spatscheck. Accurate, Scalable In-Network Identification of P'2P Traffic Using Application Signatures [ C ]//Proceedings 13th international word wide web Conference. 2004:512 - 521.
  • 4Thomas Karagiannis, Andre Broido. Transport Layer I- dentification of P2P Traffic [ C ]//IMC' 04. 2004:121 - 134.
  • 5Bartlett G, Heidemann J. Inherent behaviors for on-line detection of peer-to-peer file sharing[ R 1. ISI, 2006.
  • 6Fivos Constantinou, Panayiotis Mavrommatis. Identifying known and unktlown P2P traffic [ EB/OL ]. [ 2008 - 3 - 18 ]. http ://theory. lcs. mit. edu/ - pmavrom/P2P/.
  • 7Sebastian Zander, Thuy Nguyen. Automated Traffic Classification and Applicatiun Identification using Machine Learning [ C ]//Centre for Advanced Internet Architectures. 2005:250 - 257.
  • 8Anthony McGregor. Mark Hall. Flow Clustering Using Ma- chine Learning Techniques [ C]//Supercomputer Center, University of California San Diego. 100100 Hopkins Drive, CA92186 - 0505,2004:205 - 214.
  • 9Wang Rui ,Liu Yang,Yang Yue xiang: A New Method for P2P Traffic Identification Based on Support Vector Machine [ C ]//AIML 06 International Conference. Sharm E1 Sheikh : Egypt,2006 : 13 - 15.
  • 10Andrew W Moore, Dnis Zuev. Internet Traffic Classification Using Bayesian Analysis Techniques [ C ]//IGMETRICS. June,2005:50 - 60.

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部