期刊文献+

面向P2P特定信息监测的载荷校验算法

New Data Verify Algorithm on P2P Specific Information Monitoring
原文传递
导出
摘要 提出了一种基于载荷校验算法的P2P特定信息被动监测模型.该模型以P2P特定信息为监测对象,采用二维Bloom Filter算法进行载荷校验,以载荷校验结果为依据判断是否为被监测特定信息.通过对二维Bloom Filter算法的时间性能、空间性能、误判率的分析表明,该算法弥补了现有载荷校验算法占用内存空间大和效率低下的不足,能满足被动监测模型对载荷校验算法的各项性能要求. A passive monitoring model of P2P specific information based on data verify algorithm is pres- ented. Taking P2P specific information as the object, A two-dimensional Bloom Filter algorithm is used to verify data as the judgment reference. To analyze two-dimensional Bloom Filter algorithm's time perform- ance, space performance and misjudgment rate, the algorithm compensates the current data verify algorithm's defect of taking more memory space and with low efficiency. Two-dimensional Bloom Filter al- gorithm can meet the performance requirement of passive monitoring model to data verify algorithm.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2012年第4期28-32,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(61103178) 西北工业大学基础研究基金(JC201258) 西安市科技计划项目(HJ1104(5))
关键词 P2P特定信息 被动监测模型 载荷校验 BLOOM Filter算法 P2P specific information passive monitoring model data verify Bloom Filter algorithm
  • 相关文献

参考文献7

  • 1刘琼,徐鹏,杨海涛,彭芸.Peer-to-Peer文件共享系统的测量研究[J].软件学报,2006,17(10):2131-2140. 被引量:36
  • 2Dhungel P, Wu Di, Schonhorst B, et al. A measurement study of attacks on BitTorrent lechers [ C ] // Proceedings of the 7th International Workshop on Peer-To-Peer Sys- tems, Florida: [ s. n. ] , 2008 : 1-6.
  • 3Memon G, Rejaie R, Guo Yang, et al. Large-scale monitoring of DHT traffic [ C ]// Proceedings of the 8th International Conference on Peer-to-peer Systems, Boston: [s.n.], 2009: 11-16.
  • 4Dahmouni H, Vaton S, Rosse D. A Markovian signature- based approach to IP traffic classification [ C ]//Proceed- ings of the 3rd Annual ACM Workshop on Mining Network Data, San Diego: ACM, 2007: 29-34.
  • 5Sen S, Wang Jia. Analyzing peer-to-peer traffic across large networks[J]. IEEE ACM Trans Networking, 2004, 12(2) : 219-232.
  • 6Guo Deke, Wu Jie, Chen Honghui, et al. Theory and network applications of dynamic bloom filters [ C ] // Proceedings-INFOCOM 2006: 25th IEEE International Conference on Computer Communications, Barcelona: IEEE, 2006: 1-10.
  • 7Broder A, Mitzenmacher M. Network applications of bloom filters : A survey[ J]. Internet Mathematics, 2004, 1(4) : 485-509.

二级参考文献31

  • 1Saroiu S, Gummadi PK, Gribble SD. A measurement study of peer-to-peer file sharing systems. In: Proc. of the Multimedia Computing and Networking 2002 (MMCN 2002). 2002. 156-170. http://www.cs.washington.edu/homes/gribble/papers/mmcn.pdf
  • 2Liang J, Kumar R, Ross KW. The KaZaA overlay: A measurement study. In: Proc. of the 19th IEEE Annual Computer Communications Workshop. 2004. http://cis.poly.edu/-ross/papers/KazaaOverlay.pdf
  • 3Liang J, Kumar R, Ross KW. Understanding KaZaA. 2004. http://cis.poly.edu/-ross/papers/UnderstandingKaZaA.pdf.
  • 4Liang J, Kumar R, Xi Y, Ross KW. Pollution in file sharing systems. In: Proc. of the IEEE Infocom 2005. 2005. http://cis.poly.edu/-ross/papers/pollution.pdf
  • 5Sen S, Wang J. Analyzing peer-to-peer traffic across large networks. In: Proc. of the 2nd ACM SIGCOMM Workshop on Internet Measurement Workshop. 2002. http://citeseer.ist.psu.edu/sen02analyzing.html
  • 6Karagiannis T, Broido A, Brownlee N, Claffy KC, Faloutsos M. Is P2P dying or just hiding. In: Proc. of the IEEE Globecom 2004. 2004. 1532-1538. http://www.caida.org/outreach/papers/2004/p2p-dying/p2p-dying.pdf
  • 7Soldani C. Peer-to-Peer behavior detection by tcp flows analysis (End-of-Study Dissertation). University of Liege, 2004. http://www.run.montefiore.ulg.ac.be/-soldani/P2P_Behaviour_Detection.pdf
  • 8Sen S, Spatscheck O, Wang DM. Accurate, scalable in-network identification of P2P traffic using application signatures. In: Proc of the 13th Int'1 WWW Conf. 2004. http://www2004.org/proceedings/docs/lp512.pdf
  • 9Karagiarmis T, Broido A, Faloutsos M, Claffy KC. Transport layer identification of P2P traffic. In: Proc. of the 4th ACM SIGCOMM Conf. on Internet Measurement. 2004. 121-134. http://www.caida.org/outreach/papers/2004/p2p-layerid/p2p-layerid.pdf
  • 10Karagiannis T, Papagiannaki K, Faloutsos M. BLINC: Multilevel traffic classification in the dark. In: Proc. of the 2005 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications. 2005. 229-240. http://www.cs.ucr.edu/-tkarag/papers/BLINC_TR.pdf

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部