期刊文献+

基于SVM增量学习的P2P流媒体流量识别策略分析

Analysis of SVM Incremental Learning Strategy Based on P2P Streaming Media Traffic Identification
下载PDF
导出
摘要 网络信息化时代,对于网络中的不良流量信息进行有效的监控,然后采取有效的措施对不良流量进行抑制,对于促进网络安全和网络服务水平具有重要的意义。当前的P2P流媒体流量是网络流量监控的重点和难点,需要进行广泛研究。该文首先对当前的P2P流媒体流量的识别技术进行一定的介绍,然后对基于SVM增量学习的P2P流媒体流量识别中涉及到的一些算法、机制等进行分析,希望相关论述能够促进人们对于P2P流媒体流量识别技术重要性的清晰认识,提升人们的网络安全意识。 the network information age, effective monitoring for adverse flow of information in the network, and then take effective measures to suppress the adverse flow, has an important significance for the promotion of network security and network service lev- el. The current P2P streaming media traffic is the focus and difficulty of network traffic monitoring, require extensive research. Firstly, the current P2P streaming media traffic identification technology are introduced, and then the streaming media traffic iden- tification based on the P2P SVM incremental learning involves some algorithms, mechanism analysis, hope this can promote peo- ple for P2P streaming media traffic identification of a clear understanding of the importance of technology, to enhance network se-curity awareness people.
作者 滕翠 梁川 邓秀娟 TENG Cui, LIANG Chuan, DENG Xiu-juan (Mathematics and Computer Department of Information Engineering Baise University, Baise 533000, China)
出处 《电脑知识与技术》 2015年第4期192-194,共3页 Computer Knowledge and Technology
基金 广西教育厅高校科研一般项目(项目名称:基于流量特征的P2P流媒体流量识别技术的研究,项目编号:2013YB248)
关键词 SVM P2P 增量学习 识别 SVM P2P incremental learning identification
  • 相关文献

参考文献5

二级参考文献70

  • 1杨岳湘,王锐,唐川,李强.基于双重特征的P2P流量检测方法[J].通信学报,2006,27(z1):134-139. 被引量:8
  • 2陈亮,龚俭,徐选.基于特征串的应用层协议识别[J].计算机工程与应用,2006,42(24):16-19. 被引量:43
  • 3石萍,陈贞翔,荆山,贾冠昕,杨波.基于对等特征的P2P流量识别方法[J].中国教育网络,2007(2):36-38. 被引量:9
  • 4SEN S, SPATSCHECK O, WANG Dong-mei. Accurate, scalable innetwork identification of P2P traffic using application signatures [C]//Proc of the 13th International Conference on WWW. New York :ACM Press,2004:512-521.
  • 5SEN S, WANG Jia. Analyzing peer-to-peer traffic across large networks [ C ]//Proc of ACM SIGCOMM Internet Measurement Workshop. Piscataway, NJ : IEEE Press,2002:219-232.
  • 6KARAGIANNIS T, BROIDO A, FALOUTSOS M. Transport layer identification of P2P traffic [ C ]//Proc of the 4th ACM SIGCOMM Conference on Intemet Measurement. New York: ACM Press, 2004: 121-134.
  • 7OHZAHATAI S, HAGIWARAI Y, TERADAI M, et al. A traffic identification method and evaluations for a pure P2P application [ C ]//Proc of Passive and Active Measurement. Berlin:Springer-Verlag, 2005:55-68.
  • 8CONSTANTINOU F,MAVROMMATIS P. Identifying known and unknown peer-to-peer traffic [ C ]//Proc of the 5th IEEE International Symposium on Network Computing and Applications. Los Alamitos, CA : IEEE Computer Society ,2006:93-102.
  • 9DEDINSKI I,MEER H, HAN L,et al. Cross-layer peer-to-peer traffic identification and optimization based on active networking[ C ]//Proc of the 7th Annual International Working Conference on Active and Programmable Networks. 2005 : 13-27.
  • 10KARAGIANNIS T, BROIDO A, BROWNLEE N,et al. Is P2P dying or just hiding [ C ]//Proc of GIOBECOM 2004. Dallas, TX: IEEE Press,2004 : 1532 -1538.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部