期刊文献+

互联网流量采集分析系统设计与实现 被引量:3

Design and Implementation of Internet Traffic Collection and Analysis System
下载PDF
导出
摘要 为解决复杂网络环境下的多链路数据采集、互联网数据分发、流量识别与分析、数据发布等问题,利用虚拟管道、组播、网络数据采集与协议分析等技术,设计实现一个面向IP网络的数据汇聚分发采集分析系统。应用结果表明,该系统能识别网络流量中90%以上的应用协议,可识别的协议种类超过2 000种。 In order to solve the raw [nternet data collection, Internet data redistribution, traffic identification and protocol analysis in complex network environment, by using virtual tunnel, multicast, traffic collection and protocol analysis technology, this paper designs and implements a cater to IP network data collection, redistribution and analysis system. Application results show that the system can identify more than 90% protocols of Internet, and can identify more than 2 000 types of protocols.
出处 《计算机工程》 CAS CSCD 2012年第3期82-84,共3页 Computer Engineering
基金 上海信息化专项基金资助项目"互联网络网间结算推广系统"(沪信息委产[2007]373号)
关键词 互联网 IP流量 流量采集分析 虚拟管道 应用协议分析 Internet IP traffic traffic collection and analysis virtual tunnel application protocol analysis
  • 相关文献

参考文献5

二级参考文献29

共引文献6

同被引文献30

  • 1陈双燕,王东辉,张铁军,侯朝焕.基于WISHBONE的可兼容存储器控制器设计[J].计算机工程,2006,32(18):240-242. 被引量:3
  • 2Bilge L, Balzarotti D, Robertson W, et al. Disclosure: E tecting botnet command and control servers through large-sct NetFlow analysis [C] //Proceedings of the 28th Annual Cot puter Security Applications Conference. ACM, 201: 129-138.
  • 3Lo C H, Peng W C, Chen C W, et al. Carweb.. A traffic data collection platform[C] //gth International Conference on Mo- bile Data Management, 2008.. 221-222.
  • 4Wagner C, Engel T. Detecting anomalies in netflow record time series by using a kernel function [G]. LNCS 7279.. De- pendable Networks and Services. Berlin; Springer Berlin Hei- delberg, 2012: 122-125.
  • 5Mishra T, Sahni S. PETCAM-A power efficient TCAM ar- chitecture for forwarding tables [J]. IEEE Transactions on Computers, 2012, 61 (1): 3-17.
  • 6Ma G L, Tang W. Efficient intrusion detection for high-speed networks [J]. Applied Mechanics and Materials, 2013, 263: 2915-2919.
  • 7Yoon Sung-Ho, Park Jun-Sang, Kim Myung-Sup. Signature maintenance for Internet application traffic identification using header signatures [ C ]//Proceedings of 2012 international con- ference on network operations and management. Maui:IEEE, 2012:1151-1158.
  • 8Zhang Wen,Wang Heng. Identification of peer-to-peer traffic based on process fingerprint[ C]//Proceedings of 2011 inter- national conference on mechatronic science, electric engineer- ing and computer. Jilin : IEEE, 2011 : 1559-1562.
  • 9Du Jiang, Long Tao. P2P traffic identification research based on the SVM [ C ]//Proceedings of 2013 intemational confer- ence on wireless and optical communication. Chongqing: IEEE ,2013:683-686.
  • 10Park B, Won Y J, Kim M, et al. Towards automated application signature generation for traffic identification [ C ]//Proc of NOMS 2008. Salvador : IEEE ,2008 : 160-167.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部