期刊文献+

一种Ares协议的精确识别方法

A Method to Accurately Identify Ares Protocol
下载PDF
导出
摘要 针对单独的深度数据包检测(Deep packet inspection,DPI)技术无法识别加密报文,以及基于流量特征识别方法对流量检测的模糊性等问题,采用DPI和基于流量特征相结合的方法来对Ares协议进行精确的识别,以提高对Ares协议的识别效果,实验表明准确率可以达到97%以上。 In this paper we find a method to accurately identify the Ares protocol by using DPI combined with DFI technology. In this way, it not only overcome the shortage of DPI technology which can' t identify the encrypted flows and data flows, but also solve the imprecision of the DFI technology, so that those couples can work smoothly, and make up with each other, and also improve the identification effect, the accuracy rate can up to 97%.
出处 《信息化研究》 2012年第1期25-29,共5页 INFORMATIZATION RESEARCH
基金 国家自然科学基金(60973139 61170065 61171053) 江苏省科技支撑计划(工业)项目(BE2010197 BE 2010198 BE2011844) 江苏省高校自然科学基础研究项目(10KJB520013 10KJB520014)
关键词 点对点 协议识别 深度数据包检测技术 神经网络 流量特征 peer-to-peer protocol identification deep packet inspection neural network traffic characteristic
  • 相关文献

参考文献9

二级参考文献52

  • 1李江涛,姜永玲.P2P流量识别与管理技术[J].电信科学,2005,21(3):57-61. 被引量:43
  • 2柳斌,李芝棠,黎耀.基于访问控制列表的BitTorrent流量控制策略[J].计算机应用与软件,2006,23(5):19-20. 被引量:11
  • 3王逸欣,王锐,樊爱华,唐川.P2P流量检测技术初探[J].计算机与数字工程,2006,34(6):161-164. 被引量:19
  • 4袁震东 淇渊 林武忠.数学建模[M].上海:华东师范大学出版社,1999..
  • 5Karagiannis T, Papagiannaki K, Faloutsos M. Blinc: multilevel traffic classification in the dark [C]// Proceeding of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Los Angeles: ACM Press, 2005: 229-240.
  • 6Constantinou F, Mavrommatis P. Identifying known and unknown peer-to-peer traffic [C]//Fifth IEEE International Symposium On Network Computing And Applications. Cambridge, MA USA: IEEE Xplore, 2006: 93-102.
  • 7Thomas K, Broido A, Faloutsos M. Transport layer identification of p2p traffic [C]// Proceedings of the 4th ACM SIGCOMM conference on Internet measurement.Taormina, Sicily, Italy: ACM Press, 2004:121-134.
  • 8Collins M P, Reiter M K. Finding Peer-To-Peer file-sharing using coarse network behaviors [C]// 11th European Symposium On Research In Computer Security. Hamburg, Germany : Springer Berlin/Heidelberg, 2006 : 1 - 17.
  • 9ZHOYJ Lijuan, LI Zhitong, LIU Bin. P2P traffic identification by TCP flow analysis [C]// Proceedings of International Workshop on Networking, Architecture, and Storages 2006. Shenyang, China: IEEE Computer Society Press, 2006 : 47 - 50.
  • 10Saroiu S, Gummadi P K, Gribble S D. A measurement study of peer-to-peer file sharing systems [C]// Proceeding of the Multimedia Computing and Networking 2002. San Jose, California: ACM Press, 2002:156 - 170.

共引文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部