期刊文献+

基于行为特征加权的P2P流识别方法的研究 被引量:4

Research on P2P flow identification based on weight of behavior characteristics
下载PDF
导出
摘要 为识别网络中大量的P2P流,为网络管理提供技术支持,提出一种基于行为特征加权的P2P流识别模型。该方法不需深度报文检测(DPI),采用深度流行为检测(DFI),统计P2P应用的行为特征,并通过行为特征对P2P流识别的有效性的贡献进行分级,特征按所属级别被赋予不同的权值,通过特征匹配和加权,识别P2P流。仿真实验结果表明,该方法能够有效识别P2P业务流。 For identifying large numbers of P2P flows in the Internet and giving technical support to the Internet, a new model for identifying P2P flows is developed using the weight of the sum of characteristics. This model dose not need deep packets inspection (DPI), but only depends on the deep flow inspection (DFI), classifies P2P behavior characteristics based on their contribution to the validity of identification and endows with the weight. It uses characteristic matching and sum of weight to identify P2P flow. The experiment results show that this method exhibits good performance for identifying P2P flow.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第20期4805-4807,F0003,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2007AA01z2a1)
关键词 P2P流 深度流行为检测 深度报文检测 行为特征 匹配 P2P flow DFI DPI behavior characteristic matching
  • 相关文献

参考文献9

  • 1李玉行,宋传志.P2P流量识别与监测[EB/OL].http://www.xllw.xn/n1836c12.aspx,2007.
  • 2佚名.业务识别与管理系统和网络流量的管理[EB/OL].http://network.51cto.com/art/200809/90119.htm,2008.
  • 3Sen S, Spatscheck O, Wang Dongmei.Accurate, scalable in-network identification of P2P traffic using application signatures [C].Proceedings of the 13th International Conference on WorldWide Web.New York,NY, USA:ACM,2004: 512- 521.
  • 4Karagiannis T, Broido A,Faloutsos M,et al.Transport layer identification of P2P traffic[C].Proeeedings of the 4th ACM SIGCOMM Conference on Internet Measurement. New York, NY, USA:ACM,2004:121 - 134.
  • 5周世杰,秦志光,吴春江.对等网络流量检测技术研究[EB/OL].http://www.qkzz.net/magazine/1009_6868/2007/05/1695937.htm,2007.
  • 6Kyoungwon Suh,Daniel R Figueiredo,Jim Kurose,et al.Characterizing and detecting skype-relayed traffic[C].lEEE Infocom, 2006.
  • 7Carl Livadas, Bob Walsh, David Lapsley, et al. Using machine learning techniques to identify botnet traffic[C].Proceedings of 2nd IEEE LCN Workshop on Network Security,2006.
  • 8Constantinou F, Mavrommatis P. Identifying known and unknown peer-to-peer traffic[C].Proceedings of Fifth IEEE International Symposium on Network Computing and Applications. Cambridge. Los Alamitos, CA, USA: IEEE Computer Society, 2006:93-102.
  • 9Allot.Traffic management [EB/OL] .http://www.sandi.co.jp/seminat/report-040610/pdf/azi.pdf.

共引文献1

同被引文献19

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部