期刊文献+

一种基于机器学习的P2P网络流量识别方法 被引量:18

A P2P Network Traffic Identification Approach Based on Machine Learning
下载PDF
导出
摘要 对等(P2P)覆盖网络作为一种典型的分布式系统日益受到人们的重视.P2P应用遍及文件共享、流媒体、即时通信等多个领域,P2P应用所产生的流量占据了互联网流量的60%以上.为了更好地管理和控制P2P流量,有必要对P2P流量识别模型进行深入的研究.提出一种基于小波支持向量机的机器学习模型(ML-WSVM)来识别已知和未知的P2P流量,ML-WSVM是通过满足小波框架和Mercer定理的小波基函数替换支持向量机核函数的方法,实现小波与支持向量机的结合.该模型充分利用了小波的多尺度特性与支持向量机在分类方面的优势.然后,提出基于损失函数的串行最小化算法来优化求解ML-WSVM的最优分类面.最后,理论分析和实验结果表明该方法大大提高了对P2P网络流量的识别精度和识别效率,尤其是对加密报文的识别. Peer-to-peer (P2P) overlay networks are typical distributed systems in nature, which have attracted more and more attentions. At present, the P2P technology has been applied in file sharing, streaming media, instant messaging, and other fields. Besides, P2P network traffic accounts for more than 60% of Internet traffic. In order to better manage and control the P2P traffic, it is necessary to study a P2P traffic identification model in depth. Firstly, a machine learning model based on the wavelet support vector machine (ML-WSVM) is proposed to identify known and unknown P2P traffic. In the ML-WSVM model, the combination of the wavelet with the support vector machine is implemented by the wavelet basis function which satisfies the wavelet framework and the Mercer theorem instead of the existing support vector machine kernel functions. The proposed model makes full use of multi-scale features of the wavelet and the advantages of the support vector machine used in the classification. Then, the improved sequential minimization optimization (SMO) algorithm based on a loss function is proposed to solve the optimal hyperplane of the ML-WSVM model. Finally, the theoretical analysis and experimental results show that the ML-WSVM model can greatly improve the identification accuracy and identification efficiency of P2P network traffic, particularly to identify the encrypted packets.
出处 《计算机研究与发展》 EI CSCD 北大核心 2011年第12期2253-2260,共8页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60573141 60773041) 国家"八六三"高技术研究发展计划基金项目(2006AA01Z439 2007AA01Z404) 南京市高科技资助基金项目(2007软资127) 江苏省高校科技创新计划资助基金项目(CX10B_198Z)
关键词 对等网络 网络流量识别 支持向量机 小波函数 损失函数 peer to peer networks network traffic identification support vector machine wavelet function loss function
  • 相关文献

参考文献10

  • 1Sen S, Wang J. Analyzing peer to peer traffic across large networks [J]. IEEE Trans on Networking, 2004, 12(2): 137-150.
  • 2Sen S, Spatscheck O, Wang D. Accurate, scalable in- network identification of P2P traffic using application signatures [C] //Proc of the 13th Int Conf on World Wide Web. New York: ACM, 2004:512-521.
  • 3Wang R, Liu Y, Yang Y, et al. Solving the app-level classification problem of P2P traffic via optimized support vector machines [C] //Proc of the 6th Int Conf on Intelligent Systems Design and Applications. Piseataway, NJ: IEEE, 2006:534-539.
  • 4Karagiannis T, Broido A, Faloutsos M, et al. Transport layer identification of P2P traffic [C] //Proe of the 4th ACM SIGCOMM Conf on Internet Measurement. New York: ACM, 2004:121-134.
  • 5Auld T, Moore A W, Gull S F. Bayesian neural networks for lnternet traffic classification [J]. IEEE Trans on Neural Networks, 2007, 18(1): 223-239.
  • 6Zuev D, Moore A. Traffic classification using a statistical approach [G]//LNCS 3431 : Proc of the 6th Int Workshop on Passive and Active Network Measurement. Berlin: Springer,2005:321-324.
  • 7Constantinou F, Mavrommatis P. Identifying known and unknown peer-to-peer traffic [C] //Proc of the 5th IEEE Int Symp on Network Computing and Appli-cations. Piscataway, NJ: IEEE, 2006: 93-102.
  • 8Chen H, Hu Z, Ye Z, et al. Research of P2P traffic identification based on BP neural network [C]//Proc of the 1st Int Syrup on Computer Network and Multimedia Technology. Piscataway, NJ: IEEE, 2009:1-4.
  • 9Yang A, Jiang S, Deng H. A P2P network traffic classification method using SVM [C] //Proc of the 9th Int Conf on Young Computer Scientists. Piscataway, N J: IEEE, 2008:398-403.
  • 10Liu F, Li Z, Nie Q. A new method of P2P traffic identification based on support vector machine at the host level [C] //Proc of the ]nt Conf on Information Technology and Computer Science. Piscataway, NJ: IEEE, 2009: 579- 582.

同被引文献249

  • 1杜敏,陈兴蜀,谭骏.A Novel P2P Traffic Identification Algorithm Based on BPSO and Weighted KNN[J].China Communications,2011,8(2):52-58. 被引量:6
  • 2孟姣,王丽宏,熊刚,姚垚.基于机器学习的SSH应用分类研究[J].计算机研究与发展,2012,49(S2):153-159. 被引量:2
  • 3Sen S, Wang J. Analyzing peer to-peer traffic across large net- works[J]. IEEE Trans. on Networking, 2004,12(2) : 137 - 150.
  • 4Sen S, Spatscheck O, Wang D. Accurate, scalable in network identification of P2P traffic using application signatures[C]// Proc. of the 13th International Conference on World Wide Web, 2004:512 - 521.
  • 5Park B C, Won Y J, Kim M S, et al. Towards automated application signature generation for traffic identification[C]// Proc. of the Network Operations and Management Sympium, 2008 : 160 - 167.
  • 6Thomas K,Andre B, Michalis F, et al. Transport layer identifi cation of P2P traffic[C]//Proc, of the 4th ACM/SIGCOMM Conference on Internet Measurement, 2004:121 - 134.
  • 7Chen H, Hu Z, Ye Z, et al. Research of P2P traffic identification based on BP neural network[C]//Prac, of the 1st International Symposium Computer Network and Multimedia Technology ,2009: 1-4.
  • 8Soysal M, Schmidt E G. Machine learning algorithms for accurate flow based network traffic classification: evaluation and compari son [J]. Performance Evaluation ,2010, 67(6) :451 -467.
  • 9Alice E, Francesco G, Luca S. Support vector machines for TCP traffic classification [J], Computer Networks, 2009, 53 (14) :2476 - 2490.
  • 10Gao J,Fan W,Han J W,et al. On appropriate assumptions to mine data streams: analysis and practice[C]//Proc, of the 7th IEEE International Conference on Data Mining, 2007 : 143 - 152.

引证文献18

二级引证文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部