期刊文献+

基于信令分析的BT流量预识别方法

BitTorrent Traffic Pre-Identification Based on Signaling Analysis
下载PDF
导出
摘要 P2P(Peer-to-Peer)系统在内容共享、即时通信、流媒体等领域获得了广泛应用。然而,P2P流量消耗了大部分网络带宽,造成网络拥堵,实现对P2P流量的有效识别和管理成为了一个十分热门的话题。针对BT的信令协议,分析了从Tracker服务器、DHT网络及通过PEX协议,获取节点列表的过程,提出通过相应报文中节点列表的解析,来达到BT流量预识别的方法。该方法能准确预知BT数据流的发生,较准确地对BT流量进行识别,并且有效减少系统开销。 Peer-to-peer(P2P) systems enable a wide range of important,scalable and reliable services such as file sharing,instant messaging(IM) and video streaming.However,excessive P2P traffic can cause significant network management problems because these systems are notoriously greedy with regard to bandwidth consumption.As a result,the effective monitoring and control of BT traffic has become a very hot topic.In this paper,the source of BT peer list is descibed,and then the methods of parsing packets which contain the peer list and pre-identification processing are analyzed.In all,this method realizes an accurate pre-identification of BT traffic which reduces system overhead effectively.
出处 《计算机与数字工程》 2010年第11期168-172,共5页 Computer & Digital Engineering
基金 江苏省自然科学基金项目(编号:BK2009589) 江苏省高校自然科学研究计划项目(编号 09KJD520009 08KJB520011) 国家级大学生创新性实验计划项目(编号:57315917)资助
关键词 对等网络 信令分析 节点列表 流量预识别 peer-to-peer signaling analysis peer list traffic pre-identification
  • 相关文献

参考文献18

  • 1IPOQUE. Internet Study 2008/2009 [EB/OL]. http://www. ipoque. com/resources/internet-studies/internet-study-2008_2009.
  • 2T. Karagiannis, A. Broido, M, Faloutsos, et al. Transport Layer Identification of P2P Traffic[C]// Proceedings of the ACM SIGCOMM conference on Internet measurement, 2004 : 121 - 134.
  • 3A. Madhukar, C. Williamson. A Longitudinal Study of P2P Traffic Classification[C]//Proceedings of the IEEE International Symposium on Modeling, Analysis, and Simulation, 2006: 179- 188.
  • 4S. Sen, O. Spatscheck, D. Wang. Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures[C]//Proceedings of the International conference on World Wide Web,2004:512-521.
  • 5S. Sen, O. Spatscheck, D. Wang. Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures[C]//Proceedings of the International conference on World Wide Web, 2004 : 512-521.
  • 6X. Lu, H. Duan, X. Li. Identification of P2P traffic based on the content redistribution characteristic[J]. Communications and Information Technologies,2007.
  • 7P. Haffner, S. Sen, O. Spatscheck, et al. ACAS: automated construction of application signatures[C]// Proceedings of the 2005 ACM SIGCOMM Workshopon Mining Network Data, ACM, New York, 2005 : 197-202.
  • 8K. Xu, et al. Identify P2P traffic by inspecting data transfer behavior[J]. Comput. Commun. , 2010, 33 (10) :1141-1150.
  • 9A. Moore, D. Zuev. Internet traffic classification using Bayesian analysis [C]//Proc. ACM SIGMETRICS International Conf. Measurement and Modeling of Computer Systems 2005, Alberta, Canada,, 2005, 6 : 50-60.
  • 10N. Williams, S. Zander, G. Armitages. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification[J]. SIGCOMM Computer Communication Review, 2006, 36(5):5-16.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部