期刊文献+

基于应用层签名的P2P流量识别与控制

P2P Traffic Identification and Control Based on Application Layer Signature
下载PDF
导出
摘要 针对网络中P2P流量难以识别和控制的问题,在对P2P流量识别技术进行研究对比后,提出了一种基于应用层签名的P2P流量识别和控制的方法。分析并提取了风行、爱奇艺、优酷3种主流P2P流媒体及一些常用P2P应用软件的应用层签名,并通过实验验证了基于应用层签名的P2P流量识别方法对流量识别的高精确性以及对流量控制的有效性。 To solve the difficulty of identifying and controlling P2P traffic, a P2P traffic identification and control method is proposed based on application layer signature by studying the technology of P2P traffic identification. The application layer signatures of FengXing, iQiYi, YouKu three main- stream P2P streaming and some commonly used P2P applications are all analyzed and extracted. The experimental results show that the high accuracy for traffic identification and the effectiveness for traffic control of this method.
出处 《电视技术》 北大核心 2014年第19期57-60,68,共5页 Video Engineering
基金 江西省研究生创新专项资金项目(YC2013-S198)
关键词 流量识别 P2P 应用层签名 流量控制 traffic identification P2P application layer signatures traffic control
  • 相关文献

参考文献9

二级参考文献68

  • 1程光,龚俭,丁伟,徐加羚.面向IP流测量的哈希算法研究[J].软件学报,2005,16(5):652-658. 被引量:54
  • 2刘刚,方滨兴,胡铭曾,张宏莉.BitTorrent流量的捕获方法及自相似性的评价[J].计算机应用研究,2006,23(5):205-206. 被引量:9
  • 3陈亮,龚俭,徐选.基于特征串的应用层协议识别[J].计算机工程与应用,2006,42(24):16-19. 被引量:43
  • 4扈立新.P2P流量监控技术分析[J].中国科技信息,2007(9):97-98. 被引量:3
  • 5陈敏,张广兴,毕经平.基于SIP的VoIP流量识别方法研究[J].计算机应用研究,2007,24(4):301-303. 被引量:11
  • 6Karagiannis T, Papagiannaki K, Faloutsos M. Blinc: multilevel traffic classification in the dark [C]// Proceeding of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Los Angeles: ACM Press, 2005: 229-240.
  • 7Constantinou F, Mavrommatis P. Identifying known and unknown peer-to-peer traffic [C]//Fifth IEEE International Symposium On Network Computing And Applications. Cambridge, MA USA: IEEE Xplore, 2006: 93-102.
  • 8Thomas K, Broido A, Faloutsos M. Transport layer identification of p2p traffic [C]// Proceedings of the 4th ACM SIGCOMM conference on Internet measurement.Taormina, Sicily, Italy: ACM Press, 2004:121-134.
  • 9Collins M P, Reiter M K. Finding Peer-To-Peer file-sharing using coarse network behaviors [C]// 11th European Symposium On Research In Computer Security. Hamburg, Germany : Springer Berlin/Heidelberg, 2006 : 1 - 17.
  • 10ZHOYJ Lijuan, LI Zhitong, LIU Bin. P2P traffic identification by TCP flow analysis [C]// Proceedings of International Workshop on Networking, Architecture, and Storages 2006. Shenyang, China: IEEE Computer Society Press, 2006 : 47 - 50.

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部