期刊文献+

基于流量与行为特征的P2P流量识别模型 被引量:5

P2P Traffic Identification Model Based on Traffic and Behavior Feature
下载PDF
导出
摘要 针对点对点(P2P)用户习惯、运行环境的异构性,提出P2P流量识别的双层模型。该模型由单流内部流量特征的贝叶斯网络识别算法与多流之间行为特征的支持向量机识别算法组成。实验结果表明,相对于统计特征识别方法,该模型检测准确度提高5.4%,且对于不同应用场景具有较好的稳定性。 Considering the heterogeneity of Peer-to-Peer(P2P) users habit and runtime environment, this paper proposes a two-layered model of P2P traffic identification to identify and filter the P2P traffic. It combines both an identification algorithm of Bayesian network based on single traffic feature method and an identification algorithm of Support Vector Machine(SVM) based on mutti-traffic behavior method. Experimental results show that the method is 5.4% more accurate than the statistical feature identify method, and it has better stability in different application scenes.
出处 《计算机工程》 CAS CSCD 2012年第16期182-184,188,共4页 Computer Engineering
基金 国家"863"计划基金资助项目(2009AA01Z431) 国家自然科学基金资助项目(61103015) 湖南省自然科学基金资助项目(09JJ5043)
关键词 流量识别 点对点 双层模型 贝叶斯网络 支持向量机 行为特征 traffic identification Peer-to-Peer(P2P) two-layered model Bayesian network Support Vector Machine(SVM) behavior feature
  • 相关文献

参考文献8

  • 1蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370
  • 2Sen S, Wan G J. Analyzing Peer-to-Peer Traffic Across Large Networks[J]. IEEE/ACM Trans. on Networking, 2004, 12(2): 219-232.
  • 3Kang H J, Kim M S, Hong J W K. A Method on Multimedia Service Traffic Monitoring and Analysis[C]//Proc. of International Workshop on Distributed Systems, Operations and Management. Berlin, Germany: Springer, 2003: 93-105.
  • 4Karagiannis T, Broido A, Brownlee N, et al. File-sharing in the Interact: A Characterization of P2P Traffic in the Backbone[EB/OL]. (2004-11-19). http://research.microsoft.com/ pubs/71488/tech.pdf.
  • 5李鑫,刘东林.基于统计特征的P2P流量检测方法[J].计算机工程,2010,36(5):114-115. 被引量:10
  • 6李鹏,刘悦.一种基于行为特征和SVM的P2P流量识别模型[J].开封大学学报,2010,24(3):79-84. 被引量:3
  • 7张文,沈磊.基于特征进程的P2P流量识别[J].计算机工程,2008,34(15):120-122. 被引量:5
  • 8Valenti S, Rossi D. Identifying Key Features for P2P Traffic Classification[C]//Proc. of IEEE International Conference on Communications. [S. 1.]: IEEE Press, 2011.

二级参考文献23

  • 1徐斌,孙学康.P2P流量的识别技术[J].科技资讯,2006,4(5):109-110. 被引量:2
  • 2Karagiannis T, Broido A, Faloutsos M, et al. Transport Layer Identification of P2P Traffic[C]//Proc. of the 4th ACM SIGCOMM Conference on Intemet Measurement. New York, USA: ACM Press, 2004: 121-134.
  • 3Sen S, Spatscheck O, Wang Dongmei. Accurate Scalable in Network Identification of P2P Traffic Using Application Signatures[C]//Proc. of the 13th International World Wide Web Conference. New York, USA: ACM Press, 2004: 512-521.
  • 4Sen S,Wang J.Analyzing Peer to Peer Traffic Across Large Networks[J].ACM /IEEE Transactions on Networking,2004,12(2):137-150.
  • 5Subhabrata S,Spatscheck O,Wang D.Accurate,Scalable in-Network Identification of P2P Traffic Using Application Signatures[A].Proceedings of the 13th International Conference on World Wide Web[C].New York:ACM Press,2004:512-521.
  • 6Moore A W,Zuev D.Internet Traffic Classification Using Bayesian Analysis Techniques[A].ACM SIGMETRICS 2005[C].Banff,Alberta,Canada:ACM Press,2005:50-60.
  • 7Aimin Yang.A P2P Network Traffic Classification Method Using SVM[A].The 9th International Conference for Young Computer Scientists[C].978-0-7695-3398-8/08,2008 IEEE.
  • 8Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页
  • 9刘美兰,信息和通信安全CCICS’99:第1届中国信息和通信安全学术会议论文集,2000年,105页
  • 10Chen S,Internet draftdraft- ietf- cidf- data- formats- 0 0 .txt,1998年

共引文献384

同被引文献50

  • 1田新广,孙春来,段洣毅,钱小军,邱志明.基于机器学习的用户行为异常检测模型[J].计算机工程与应用,2006,42(19):101-103. 被引量:8
  • 2林果园,郭山清,黄皓,曹天杰.基于动态行为和特征模式的异常检测模型[J].计算机学报,2006,29(9):1553-1560. 被引量:25
  • 3苏璞睿,冯登国.基于进程行为的异常检测模型[J].电子学报,2006,34(10):1809-1811. 被引量:17
  • 4陈敏,张广兴,毕经平.基于SIP的VoIP流量识别方法研究[J].计算机应用研究,2007,24(4):301-303. 被引量:11
  • 5YE Q L, ZHAO C X, YEN. Least squares twin support vector ma- chine classification via maximum one-class within class variance[ J]. Optimization Methods and Software, 2012, 27(1) : 53 -69.
  • 6STEINBACH M. Introduction to data mining[ M].2版.范明,范宏建,译.北京:人民邮电出版社,2011.
  • 7KHEMCHANDANI J R, CHANDRA S. Twin support vector ma- chines for pattem classfication[ J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007, 29(5) : 905 -910.
  • 8MOORE A W, ZUEV D. Internet traffic classification using Bayes- ian analysis techniques[ C]///Proeeedinhgs of the 2005 ACM SIG- METRICS Conference on Measurement and Modeling of Computer Systems. New York: ACM, 2005:50 -60.
  • 9ROUGHAN M,SEN S,SPATSCHECK O,et al.Class-of-service mapping for QoS:a statistical signatu-re-based approach to IP traffic classification[C] //Proc.the 4th ACM SIGCOMM Conference on Internet Measurement.[S.l.] :ACM Press,2004:135-148.
  • 10SEN S,SPATSCHECK O,WANG D.Accurate,scalable in-network identificationof P2P traffic using application signatures[C] //Proc.13th International Conference on World Wide Web.[S.l.] :ACM Press,2004:512-521.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部