期刊文献+

基于缓存命中的DPI系统预处理方法

A Pretreatment of DPI System Based on the Cache Hit
下载PDF
导出
摘要 移动网络数据业务的迅猛增长在带来便利和收益的同时,也产生了诸多的安全隐患,为了净化移动网络环境,挖掘网络数据的潜在价值,运营商多采用移动数据流量DPI系统来统一监管网络数据,但面对高速网络数据,DPI的处理性能堪忧。为了优化高速网络数据下的DPI处理效率,文章提出一种基于缓存命中的预处理方法。以数据包的五元组信息作为键,以封装有协议特征标记的连接作为值,创建哈希结构缓存,后续到来的数据包在进入DPI处理前,检索缓存区相应键值对,若命中则将其标记成已识别数据包,这样就避免了部分的数据包进行DPI的模式匹配处理,减小了DPI处理压力,提高了系统的吞吐量。实验证明该方法可有效提升移动网络数据解析效率。 The rapid growth o f data services in mobile network brings not only convenience and benefits,but also lots o f security risks.In order to purify the mobile network environment and mining the potential value of network data,more and more operators use DPI(Deep Packet Inspection) systemson m obile data traffic to supervise the network data.However,facing high speed network data,DPI systems have a poor performance.In order to improve the efficiency of DPI processing in high speednetwork data,this paper proposes a new method o f pretreatment based on the cache hit.The five-tuple o fthe data packets used as the key and the connection with the protocol mark used as the value,create the hash structure cache.Before arrival packets entering the DPI process,search their key-value pairs in thecache.If the key-value pair is found5mark the packet identified.By avoiding pattern matching processing of some data packets,the DPI processing pressure is reduced,and the throughput of the system ifimproved.Experim ents show that this method effectively enhance the efficiency of the analysis of mobile network data.The method is feasible and can be recommended.
作者 马跃鹏 刘吉强 王健 MA Yuepeng;LIU Jiqiang;WANG Jian(School of Computer and Information Technology of Beijing Jiaotong University, Beijing 100044, China)
出处 《信息网络安全》 2016年第10期69-75,共7页 Netinfo Security
基金 国家自然科学基金[61672092]
关键词 移动网络数据 DPI 缓存命中 五元组 协议特征标记 mobile network data DPI cache hit five-tuple protocol mark
  • 相关文献

参考文献9

二级参考文献85

  • 1魏永,周云峰,郭利超.OpenDPI报文识别分析[J].计算机工程,2011,37(S1):98-100. 被引量:7
  • 2黄昆,张大方,谢高岗,金军航.一种面向深度数据包检测的紧凑型正则表达式匹配算法[J].中国科学:信息科学,2010,40(2):356-370. 被引量:12
  • 3王佰玲,方滨兴,云晓春.零拷贝报文捕获平台的研究与实现[J].计算机学报,2005,28(1):46-52. 被引量:67
  • 4张宇雷,黄皓.基于网络处理器的零拷贝技术[J].计算机应用研究,2007,24(1):288-290. 被引量:4
  • 5Karagiannis T, Papagiannaki K, Faloutsos M. Blinc: multilevel traffic classification in the dark [C]// Proceeding of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Los Angeles: ACM Press, 2005: 229-240.
  • 6Constantinou F, Mavrommatis P. Identifying known and unknown peer-to-peer traffic [C]//Fifth IEEE International Symposium On Network Computing And Applications. Cambridge, MA USA: IEEE Xplore, 2006: 93-102.
  • 7Thomas K, Broido A, Faloutsos M. Transport layer identification of p2p traffic [C]// Proceedings of the 4th ACM SIGCOMM conference on Internet measurement.Taormina, Sicily, Italy: ACM Press, 2004:121-134.
  • 8Collins M P, Reiter M K. Finding Peer-To-Peer file-sharing using coarse network behaviors [C]// 11th European Symposium On Research In Computer Security. Hamburg, Germany : Springer Berlin/Heidelberg, 2006 : 1 - 17.
  • 9ZHOYJ Lijuan, LI Zhitong, LIU Bin. P2P traffic identification by TCP flow analysis [C]// Proceedings of International Workshop on Networking, Architecture, and Storages 2006. Shenyang, China: IEEE Computer Society Press, 2006 : 47 - 50.
  • 10Saroiu S, Gummadi P K, Gribble S D. A measurement study of peer-to-peer file sharing systems [C]// Proceeding of the Multimedia Computing and Networking 2002. San Jose, California: ACM Press, 2002:156 - 170.

共引文献128

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部