期刊文献+

基于流特征的P2P流量识别方法研究 被引量:4

Research of Identifying P2P Protocols Based on P2P Traffic Characteristics
下载PDF
导出
摘要 P2P业务流量在对互联网应用起巨大推动作用的同时,也带来了因资源过度占用而引起的网络拥塞以及安全隐患等问题,妨碍了正常的网络业务的开展。为了保证网络能正常有序的运行,有必要对P2P流量进行控制。但是,随着动态端口和数据加密技术的出现,传统的流量识别方法面临着巨大的挑战。简要介绍了三种主要的流量识别技术,并且比较了它们的优缺点。着重对基于流特征的流量识别方法效率低下的原因做了详细的分析,分别指出了引起误报和漏报的原因,并且给出了相应的解决方案。实验证明:文中方法能够有效提高P2P流量识别效率。 The P2P traffic played a huge role in the Interact promoting. At the same time it has also brought occupation, network oongestion and safety problems. It is necessary to have a control over the P2P traffic. However, with the emergenee of dyanmie port and SSL, the P2P traffic identification is becoming more and more challenging. This article briefly introduced the main technologies of P2P traffic identification including the routing way such as port scan, deep packet inspection and transport layer identification, and makes a heavy weight on the analysis about the reasons of low efficiency of the technique based upon P2P traffic characteristics. Finally, this method shows high efficiency in the test experiment.
出处 《计算机技术与发展》 2009年第9期46-48,53,共4页 Computer Technology and Development
基金 国家自然科学基金项目(60673164)
关键词 P2P 流特征分析 流量识别 peer-to-peer traffic charaeterization traffic models
  • 相关文献

参考文献9

  • 1李江涛,姜永玲.P2P流量识别与管理技术[J].电信科学,2005,21(3):57-61. 被引量:43
  • 2石萍,陈贞翔,荆山,贾冠昕,杨波.基于对等特征的P2P流量识别方法[J].中国教育网络,2007(2):36-38. 被引量:9
  • 3Sen S, Spatscheck O, Wang Dongrnd. Accurate, scalable in - network identification of p2p traffic using application signature[C]//In WWW '04: Proceedings of the 13th international conference on World WideWeb. New York, NY, USA: ACMPress, 2004: 512 - 521.
  • 4Karagiannis T, Broido A, Faloutsos M. Transport layer identification of p2p traffic[ C] // In Proceedings of the 4th ACM SIGCOMM conference on Intmet measurement. New York, USA:ACM Press,2004:121 - 134.
  • 5蒋海明,张剑英,王青青,彭娟.P2P流量检测与分析[J].计算机技术与发展,2008,18(7):74-76. 被引量:25
  • 6温超,郑雪峰,戚翔,于真.基于流量分析的P2P协议识别方法的研究[J].微计算机应用,2007,28(7):714-717. 被引量:7
  • 7Constantinou F,Mavrommatis P. Identifying Known and Unknown Peer - to - Peer Traffic[ C] ff Network Computing and Applications, 2006. NCA 2006. Fifth IEEE International Symposium onVolume,2006: 93 - 102.
  • 8Bolla R, Canini M, Rapuzzi R. On the Double- Faced Nature of P2P Traffic Department of Communication[C]//In Proceedings of the Sixteenth Euromiero Coherence on Parallel, Distributed and Network-Based Processing (PDP' 08). [s. l. ] : [s.n. ] ,2008:524 - 530.
  • 9柳斌,李之棠,李佳.一种基于流特征的P2P流量实时识别方法[J].厦门大学学报(自然科学版),2007,46(A02):132-135. 被引量:15

二级参考文献22

  • 1White paper Caspian&Cachelogic _P2P, http://www.caspiannetworks.corn/files/CaspianCacheLogic_P2P.pdf.
  • 2Yeager W, Williams J. Secure peer to peer networking: the JXTA example. IT Pro, 2002,4(2) :53-57.
  • 3Fivos Constantinou,Panayiotis Mavrommatis.Identifying Known and Unknown Peer-to-Peer Traffic.mit.USA 2005
  • 4A.Broido,Y.Hyun,R.Gao,and kc claffy.Their share:diversity and disparity in I Ptraffic.In PAM,2004
  • 5T.Karagiannis,A.Broido,N.Browniee,Kc Claffy,and M.Faloutsos.Is p2 Pdying or just hiding?In Globecom,ballas,TX,USA,November 2004.
  • 6Thomas Karagiannis,Andre Broido,MichalisF aloutsos,and Kc claffy.Transport layer identification of p2 Ptraffic.In IMC'04:Proceedings of the 4th ACM SIGCOMM conference on Internet measurement,New York,NY,USA,2004.ACM Press pages 121-134
  • 7BitTorrent.http://bitconjurer.org/BitTorrent/
  • 8eDonkey2000.http://www.edonkey2000.com/
  • 9Sen S, Spatscheck O, Wang D. Accurate, scalable in-network identification of P2P traffic using application signatures[C]//in Proceedings of the 13th International Conference on World Wide Web. New York, 2004.
  • 10Angelo Spognardi, Alessandro Lucarelli. A methodology for P2P file-sharing traffic detection[ C]//in Proceedings of the 2005 Second International Workshop on Hot Topics in Peer-to-Peer Systems (HOT-P2P05). 2005.

共引文献89

同被引文献42

  • 1裴江,卢选民,周亚建.一种基于节点状态的P2P流量检测模型[J].计算机应用,2009,29(3):662-664. 被引量:3
  • 2周文莉,吴晓非.P2P技术综述[J].计算机工程与设计,2006,27(1):76-79. 被引量:111
  • 3杨文俊.P2P网络系统中节点自组织管理机制[J].计算机技术与发展,2006,16(7):57-60. 被引量:7
  • 4周鹏,鱼滨.基于P2P分布式数据库实时更新[J].计算机技术与发展,2007,17(5):144-147. 被引量:6
  • 5温超,郑雪峰,戚翔,于真.基于流量分析的P2P协议识别方法的研究[J].微计算机应用,2007,28(7):714-717. 被引量:7
  • 6Cache logic中国互联网流量分析报告[EB/OL].2005.http://www.cachelogic.com/home/pages/research/p2p.2005.php.
  • 7Saroiu S,Gummadi P K,Gribble S D.A measurement study of peer-to-peer file sharing systems[C] //Proceeding of the Multimedia Computing and Networking 2002.San Jose,California:ACM Press,2002:156-170.
  • 8WANG Rui,LIU Yang,YANG Yuexiang,et al.Solving the app-level classification problem of P2P traffic via optimized support vector machines[C] //Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications.Jinan,China:IEEE Computer Society Press,2006:534-539.
  • 9Moore A W,Zuev D.Internet Traffic Classification Using Bayesian Analysis Techniques[C] //ACM SIGMETRICS 2005.Banff,Alberta,Canada:ACM Press,2005:50-60.
  • 10Yang Ai-min.A P2P Network Traffic Classification Method Using SVM[C] ∥The 9th International Conference for Young Computer Scientists.[s.l.] :IEEE,2008.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部