期刊文献+

宽带流量分析方法探讨

下载PDF
导出
摘要 网络流量的具体内容通常不可知,通过网络流量分析可以获得网络流量的各项统计数据,发现流量的访问规律,结合网络管理的各项手段发现网络中存在的问题或流量可能对网络产生的不良影响,并为下一步制定或修正网管策略提供依据。
作者 林波
机构地区 济南市联通公司
出处 《科技传播》 2016年第13期104-,125,共2页 Public Communication of Science & Technology
  • 相关文献

参考文献2

二级参考文献31

  • 1Karagiannis T, Papagiannaki K, Faloutsos M. Blinc: multilevel traffic classification in the dark [C]// Proceeding of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Los Angeles: ACM Press, 2005: 229-240.
  • 2Constantinou F, Mavrommatis P. Identifying known and unknown peer-to-peer traffic [C]//Fifth IEEE International Symposium On Network Computing And Applications. Cambridge, MA USA: IEEE Xplore, 2006: 93-102.
  • 3Thomas K, Broido A, Faloutsos M. Transport layer identification of p2p traffic [C]// Proceedings of the 4th ACM SIGCOMM conference on Internet measurement.Taormina, Sicily, Italy: ACM Press, 2004:121-134.
  • 4Collins M P, Reiter M K. Finding Peer-To-Peer file-sharing using coarse network behaviors [C]// 11th European Symposium On Research In Computer Security. Hamburg, Germany : Springer Berlin/Heidelberg, 2006 : 1 - 17.
  • 5ZHOYJ Lijuan, LI Zhitong, LIU Bin. P2P traffic identification by TCP flow analysis [C]// Proceedings of International Workshop on Networking, Architecture, and Storages 2006. Shenyang, China: IEEE Computer Society Press, 2006 : 47 - 50.
  • 6Saroiu S, Gummadi P K, Gribble S D. A measurement study of peer-to-peer file sharing systems [C]// Proceeding of the Multimedia Computing and Networking 2002. San Jose, California: ACM Press, 2002:156 - 170.
  • 7Wilson D. CacheLogic Study-P2P is Changing. [EB/OL] (2005-9-16). http://www. slyck, com/story914_ CacheLogic_ Study- P2P- is- Changing.
  • 8Subhabrata S, Wang J. Analyzing peer-to-peer traffic across large networks [C]// The 2nd Internet Measurement Workshop. Marseille, France: ACM Press, 2004: 219-232.
  • 9YI Minggong. Identifying P2P users using traffic analysis [EB/OL]. (2005-07-21). http ://www. securityfocus. com/infocus/1843/1 - 3.
  • 10CHEN Zhenxiang, WANG Haiyang, PENG Lizhi, et al. A Novel Method of P2P Hosts Detection Based on Flexible Neural Tree [C]// Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications. Jinan, China: IEEE Xplore, 2006: 556- 561.

共引文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部