期刊文献+

基于端点特征的P2P流媒体识别方法 被引量:2

P2P streaming identification method based on endpoint features
下载PDF
导出
摘要 P2P流媒体流量中的控制流与数据流,由于统计特征差异较大,致使DFI(深度流检测)方法识别其效果不佳。借鉴DFI的思想,提出一种基于端点特征识别P2P流媒体流量的方法。该方法针对网络端点,提取了六个有效特征,并结合机器学习的方法识别P2P流媒体流量。实验结果表明,该方法比DFI识别的整体准确率要高,且可以用于P2P流媒体的在线识别。 Due to the great differences in statistical features between control flows and data flows,the performance of DFI(deep flow inspection) in the identification of P2P streaming traffic is not so ideal.Enlightened by the idea of DFI,this paper proposed a P2P streaming identification method based on endpoint features.This method chose six features aimed at net-endpoint so as to identify P2P streaming traffic using machine learning.Experimental results show that this method performs better in overall accuracy over DFI,and it can also be used in real-time P2P streaming traffic identification.
出处 《计算机应用研究》 CSCD 北大核心 2012年第7期2600-2602,2606,共4页 Application Research of Computers
基金 国家科技支撑计划课题(2011BAH19B01)
关键词 P2P流媒体 机器学习 端点 P2P streaming machine learning flow endpoint
  • 相关文献

参考文献11

  • 1张艺濒,张志斌,赵咏,郭莉.TCP与UDP网络流量对比分析研究[J].计算机应用研究,2010,27(6):2192-2197. 被引量:41
  • 2雷蕾,沈富可.基于连接特征的P2P流媒体应用的识别[J].计算机应用,2007,27(B12):41-43. 被引量:3
  • 3LIU Chao-bin,YANG Yue-xiang,TAN Chuan. A classification method of unstructured P2P multicast video streaming based on SVM[A].Washington DC ; IEEE Computer Society,2009.68-72.
  • 4NGUYEN T,ARMITAGE G. A survey of techniques for Internst traffic classification using machine learning[J].Communications Surveys & Tutorials,2008,(04):56-76.
  • 5FINAMORE A,MELLIA M,MEO M. KISS:stochastic packet inspection[A].Beilin:Springer-Verlag,2009.117-125.
  • 6ROSSI D,VALENTI S. Fine-grained traffic classification with Netflow data[A].New York:ACM,2010.4503-4507.
  • 7蒋海明,张剑英,刘琼,王秀娟,何霁野.PPLive协议分析及流量识别[J].电讯技术,2009,49(5):21-24. 被引量:2
  • 8ALESSANDRIA E,GALLO M,LEONARDI E. P2P-TV systems under adverse network conditions:s measurement study[A].2009.100-108.
  • 9SILVERSTON T,FOURMAUX O. P2P IPTV measurement:a comparison study[J].Computing and Gomputers,2006,(03):53-59.
  • 10PERENYI M,DANG T D,GEFFERTH A. Identification and analysis of peer-to-peer traffic[J].Journal of Communication,2006,(07):36-46.

二级参考文献47

  • 1周明中,龚俭,丁伟.高速网络中基于流速测度的动态超时策略[J].软件学报,2006,17(10):2141-2151. 被引量:5
  • 2CacheLogic.中国互联网实际流量模式分析报告[EB/OL].(2005-12-08)[2008-12-10].http://www.Cachelogie.com.
  • 3中国互联网络信息中心.第23次中国互联网络发展状况统计报告[EB/OL].http://www.cnnic.cn/index/OE/00/11/index.htm,2009-01-13.
  • 4Sen S,Spatscheck O,Wang D.Accurate,Scalable In-Network Identification of P2P Traffic Using Application Signature[C]//WWW2004.New York,ACM,2004:512-521.
  • 5KARAGIANNIS T,BROIDO A,FALOUTSOS M.Transport layer identification of P2P traffic[C]//the 4th ACM SIGGCOMM conference on Internet measurement.New York,USA:ACM,2004:121-134.
  • 6Hei X,Liang C,Liang J,et al.Ross.Insights into PPLive:A Measurement Study of a Large-Scale P2P IPTV System[C]//International Word Wide Web Conference.IPTV Workshop,2006.
  • 7LELAND W E,TAQQU M S,WILLINGER W,et al.On the self-similar nature of Ethernet traffic[J].IEEE/ACM Trans on Networking,1994,2(1):1-15.
  • 8CLARK D D.The design philosphy of the DARPA Internet protocols[J].ACM SIGCOMM Computer Communication Review,1995,25(1):102-111.
  • 9JAIN R,ROUTHIER S A.Packet trains-measurements and a new model for computer network traffic[J].IEEE Journal on Selected Area in Communications,1986,4(6):986-995.
  • 10ACHARYA M,NEWMAN-WOLFE U,LATCHMAN H,et al.Real-time hierarchical traffic characterization of a campus area network[C] //Proc of the 6th International Conference on Modeling Techniques and Tools,for Computer Performance Evaluation.1992.

共引文献42

同被引文献15

  • 1VALENTI S, ROSSI D, MEO M,et al. Accurate, fine- grained classification of P2P-TV applications by simply counting packets[C].First International Workshop on Traffic Monitoring and Analysis, Aachen, Germany, 2009.
  • 2万成威.基于P2P流媒体模型的流量特征分析及实时分类[D].郑州:解放军信息工程大学,2012.
  • 3KARAGIANNIS T, PAPAGIANNAKI K, FALOUTSOS M. BLINC: multilevel traffic classification in the dark[C].ACM SIGCOMM Conference, Philadelphia, USA, 2005.
  • 4Teufl P,Payer U,Amling M,et al. InFeCT-Net-work traffic classification [C] // Proc. of the 7thInti Conf. on Networking. Cancun: IEEE Comput-er Society, 2008 : 439-444.
  • 5Yang A M, Jiang S Y,Deng H. A P2P networktraffic classification method using SVM [C] //Proc. of the 9th Int,l Conf. for Young ComputerScientists. [S. 1. ] ; IEEE Computer Society, 2008 :398-403.
  • 6Este A,Gringoli F,Salgarelli L. On the stability ofthe information carried by traffic flow features atthe packet level[J]. ACM Sigcomm Computer Com-munication Review,2009 ,39(3) : 13-18.
  • 7Este A, Gringoli F, Salgarelli L. Support vectormachines for TCP traffic classification[J]. Comput-er Networks ,2009,53(14) : 2476-2490.
  • 8莫德敏,刘耀军.对串匹配技术中的Wu-Manber算法的研究[D].太原:太原科技大学,2009.
  • 9刘兴彬,杨建华,谢高岗,胡玥.基于Apriori算法的流量识别特征自动提取方法[J].通信学报,2008,29(12):51-59. 被引量:39
  • 10孙立媛,朱亦宁,孙锐轩.Snort规则的分析与实现[J].计算机安全,2009(9):45-48. 被引量:3

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部