期刊文献+

基于分形理论P2P流量行为的自相似性 被引量:3

Study on the Self-Similarity of P2P Traffic Behavior Based on Fractal Method
原文传递
导出
摘要 针对单个主机单个协议流量的自相似性和非宏观上流量的自相似性,分析了端到端(P2P)网络流量的自相似性.对常见的端到端(P2P)应用进行分析后发现,其应用层数据存在自相似性,且在时间尺度与行为尺度的比较中,P2P应用层流量在行为尺度上的自相似性表现得更加明显和稳定.为了将行为尺度上的自相似性应用到业务感知领域,提出了一种新的P2P流量识别算法,该算法通过计算网络流量不同行为尺度下的容量维,再辅以主动系数来识别P2P流量.实验结果证明,新算法在P2P流量识别方面的准确率高于同类算法,在加密流量的识别上表现尤为突出. The self-similarity of peer-to-peer ( P2P) traffic is studied based on fractal method. Different from former researches,the traffic of single protocol is concerned. Two popular P2P applications are tested and showen that the application layer traffic tends to be self-similar. The self-similarity is more stable under behavior scale than under time scale. The self-similarity of the P2P traffic is applied to P2P traffic identification. A new traffic identification algorithm is proposed based on the fractal dimension and positivity of the network traffic. Experimentss show that the performance of the proposed algorithm is better than the existed in terms of accuracy especially for encrypted traffic.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2010年第4期35-38,58,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60821001) 国家高技术研究发展计划项目(2008AA011004) 北京市自然科学基金项目(4092029) 教育部博士点基金项目(20060013007)
关键词 端到端 网络流量 自相似 分形 分维 peer to peer network traffic self-similarity fractal fractal dimension
  • 相关文献

参考文献10

  • 1Leland W, Taqqu M, Willinger W, et al. On the selfsimilar nature of Ethernet traffic (extended version) [ J]. IEEE/ACM Transactions on Networking, 1994 (2) : 1- 15.
  • 2Paxson V, Floyd S. Wide area traffic : the failure of poisson modeling [ J]. IEEE/ACM Transactions on Networking, 1995, 3: 226-244.
  • 3Crovella M, Bestavros A. Self-similarity in world wide web traffic: evidence and possible causes [ J ]. IEEE! ACM Transactions on Networking, 1997 (5) : 835-846.
  • 4Willinger W, Taqqu M, Sherman R, et al. Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level[ J]. IEEE/ACM Transactions on Networking, 1997 (5) : 71-86.
  • 5Erramilli A, Roughan M, Veitch D, et al. Self-similar traffic and network dynamics [ J ]. Proceedings of the IEEE, 2002(90) : 800-819.
  • 6Doi H, Matsuda T, Yamamoto M. Influences of TCP congestion control mechanisms to multi-fractal nature of generated traffic [ C ] //Global Telecommunications Conference. San Francisco: [s. n. ] , 2003: 3658-3662.
  • 7Fiedler M, Carlsson P, Nilsson A. Voice and muhi-fractal data in the Internet [ C]//26th Annual IEEE Conference on Local Computer Networks. Tampa: [ s. n. ] , 2001 : 426-431.
  • 8Hiroki D, Matsuda T, Yamamoto M. Performance evaluation of multi-fractal nature of TCP traffic with RED gateway[ C]//29th Annual IEEE International Conference on Local Computer Networks. Tampa: [ s. n. ] , 2004: 400- 401.
  • 9Sen S, Spatscheck O, Wang D. Accurate, scalable innetwork identification of P2P traffic using application signatures[ C ] // Thirteenth International World Wide Web Conference. New York: [s.n.], 2004: 512-521.
  • 10Karagiannis T, Broido A, Faloutsos M, et al. Transport layer identification of P2P traffic [ C ] // IMC 2004. Taormina: [s. n. ] , 2004: 121-134.

同被引文献33

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部