期刊文献+

P2P流量检测技术 被引量:1

P2P流量检测技术
下载PDF
导出
摘要 对P2P流量的检测,把它和传统的流量区分出来。这里我们介绍了4种典型的P2P流量检测技术:常用端口检测法、应用层特征检测法、流量特征检测法以及连接模式检测法,总结各个技术的优缺点,最后分析了P2P流量检测技术进一步的研究方向。 To accomplish this goal, the system must identify the P2P traffic first. Current identification technology can be generally divided into four categories:as port identification methods,application layer feature methods, traffic feature methods and connection patterns methods. This paper surveys the advantages and disadvantages of the current P2P flow identification methods. The survey also indicates new directions in P2P detection.
作者 郦昊 吴安清
出处 《湖北农机化》 2009年第5期62-64,共3页
关键词 P2P流量检测 应用层特征检测法 流量特征检测法 连接模式检测法 P2P traffic identification application layer feature methods traffic feature methods Connection patterns methods
  • 相关文献

参考文献2

二级参考文献23

  • 1Karagiannis T, Papagiannaki K, Faloutsos M. Blinc: multilevel traffic classification in the dark [C]// Proceeding of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Los Angeles: ACM Press, 2005: 229-240.
  • 2Constantinou F, Mavrommatis P. Identifying known and unknown peer-to-peer traffic [C]//Fifth IEEE International Symposium On Network Computing And Applications. Cambridge, MA USA: IEEE Xplore, 2006: 93-102.
  • 3Thomas K, Broido A, Faloutsos M. Transport layer identification of p2p traffic [C]// Proceedings of the 4th ACM SIGCOMM conference on Internet measurement.Taormina, Sicily, Italy: ACM Press, 2004:121-134.
  • 4Collins M P, Reiter M K. Finding Peer-To-Peer file-sharing using coarse network behaviors [C]// 11th European Symposium On Research In Computer Security. Hamburg, Germany : Springer Berlin/Heidelberg, 2006 : 1 - 17.
  • 5ZHOYJ Lijuan, LI Zhitong, LIU Bin. P2P traffic identification by TCP flow analysis [C]// Proceedings of International Workshop on Networking, Architecture, and Storages 2006. Shenyang, China: IEEE Computer Society Press, 2006 : 47 - 50.
  • 6Saroiu S, Gummadi P K, Gribble S D. A measurement study of peer-to-peer file sharing systems [C]// Proceeding of the Multimedia Computing and Networking 2002. San Jose, California: ACM Press, 2002:156 - 170.
  • 7Wilson D. CacheLogic Study-P2P is Changing. [EB/OL] (2005-9-16). http://www. slyck, com/story914_ CacheLogic_ Study- P2P- is- Changing.
  • 8Subhabrata S, Wang J. Analyzing peer-to-peer traffic across large networks [C]// The 2nd Internet Measurement Workshop. Marseille, France: ACM Press, 2004: 219-232.
  • 9YI Minggong. Identifying P2P users using traffic analysis [EB/OL]. (2005-07-21). http ://www. securityfocus. com/infocus/1843/1 - 3.
  • 10CHEN Zhenxiang, WANG Haiyang, PENG Lizhi, et al. A Novel Method of P2P Hosts Detection Based on Flexible Neural Tree [C]// Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications. Jinan, China: IEEE Xplore, 2006: 556- 561.

共引文献20

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部