期刊文献+

基于应用层签名特征的P2P流量识别 被引量:4

P2P traffic identification based on signature features of application layer
下载PDF
导出
摘要 P2P的广泛使用带来了带宽过量消耗、病毒传播迅速等严重问题。如何在享受P2P技术带来便利的同时又能有效地识别、控制P2P流量是当前的研究热点。通过基于报文TRACE的数据分析方法,获得了当前五种主流的P2P流的应用层签名特征,提出了一个基于应用层签名特征的识别算法,并通过实际实验对所提识别算法的有效性进行了验证,研究成果可直接应用于P2P流量的识别与管理。 The widespread use of P2P has brought a serious of problems,such as excessive consumption,the rapid spread of the virus and so on.The current research focus is how to identify and control P2P traffic,at the same time people can enjoy the convenience brought by P2P technology.Signature features of the application layer of five mainstream P2P applications are obtained by analyzing TRACE data,and then the algorithm of identifying P2P,based on signature features of the application layer,is proposed in this paper,and the effectiveness of the algorithm is verified by the actual experiment.This research can be directly applied to the identification and management of P2P traffic.
作者 方莹
出处 《计算机工程与应用》 CSCD 2012年第3期73-75,共3页 Computer Engineering and Applications
基金 河南省基础与前沿技术研究计划项目(No.112300410301) 河南省教育厅自然科学研究计划项目(No.2010A520031)
关键词 P2P流量 应用层签名 流量识别 行为分析 P2P traffic application signature traffic identification behavioral analysis
  • 相关文献

参考文献9

  • 1扈立新.P2P流量监控技术分析[J].中国科技信息,2007(9):97-98. 被引量:3
  • 2Subhabrata S, Wang J.Analyzing peer-to-peer traffic across large networks[C]//The 2nd Internet Measurement Workshop.Marseille, France: ACM Press, 2004: 219-232.
  • 3余浩,徐明伟.P2P流检测技术研究综述[J].清华大学学报(自然科学版),2009(4):616-620. 被引量:20
  • 4Roughan M, Subhabrata S, Spatscheck O, et al.Class-of-service map- ping for Qos: a statistical signature-based approach to IP traffic classification[C]//Proceedings of the 4th ACM SIGCOMM Con- ference on Intemet Measurement.New York, USA:ACM Press, 2004:135-148.
  • 5Wang Rui, Liu Yang, Yang Yuexiang, et al.Solving the app-level classification problem of P2P traffic via optimized support vec- tor machines[C]//Proceedings of the Sixth International Confer- ence on Intelligent Systems Design and Applications.Jinan,Chi- na:IEEE Computer Society Press,2006:534-539.
  • 6Subhabmta S, Spatscheck O, Wang D.Accurate, scalable in-network identification of p2p traffic using application signatures[C]//Pro- ceedings of the 13th International Conference on World Wide Web.New York:ACM Press,2004:512-521.
  • 7Won Y J, Park B C, Ju H T, et al.A hybrid approach for accu- rate application traffic identification[C]//Proc of E2EMON'06, 2006:1-8.
  • 8Karagiannis T, Broido A, Brownlee N, et al.Is P2P dying or just hiding[C]//Proceedings of G1OBECOM 2004.Dallas, TX: IEEE Press, 2004: 1532-1538.
  • 9李明伟,张大方,曾彬,黎文伟.基于有效载荷分析的BT流量识别技术[J].计算机应用,2007,27(9):2230-2232. 被引量:8

二级参考文献24

  • 1刘刚,方滨兴,胡铭曾,张宏莉.BitTorrent流量的捕获方法及自相似性的评价[J].计算机应用研究,2006,23(5):205-206. 被引量:9
  • 2陈亮,龚俭,徐选.基于特征串的应用层协议识别[J].计算机工程与应用,2006,42(24):16-19. 被引量:43
  • 3Karagiannis T, Papagiannaki K, Faloutsos M. Blinc: multilevel traffic classification in the dark [C]// Proceeding of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Los Angeles: ACM Press, 2005: 229-240.
  • 4Constantinou F, Mavrommatis P. Identifying known and unknown peer-to-peer traffic [C]//Fifth IEEE International Symposium On Network Computing And Applications. Cambridge, MA USA: IEEE Xplore, 2006: 93-102.
  • 5Thomas K, Broido A, Faloutsos M. Transport layer identification of p2p traffic [C]// Proceedings of the 4th ACM SIGCOMM conference on Internet measurement.Taormina, Sicily, Italy: ACM Press, 2004:121-134.
  • 6Collins M P, Reiter M K. Finding Peer-To-Peer file-sharing using coarse network behaviors [C]// 11th European Symposium On Research In Computer Security. Hamburg, Germany : Springer Berlin/Heidelberg, 2006 : 1 - 17.
  • 7ZHOYJ Lijuan, LI Zhitong, LIU Bin. P2P traffic identification by TCP flow analysis [C]// Proceedings of International Workshop on Networking, Architecture, and Storages 2006. Shenyang, China: IEEE Computer Society Press, 2006 : 47 - 50.
  • 8Saroiu S, Gummadi P K, Gribble S D. A measurement study of peer-to-peer file sharing systems [C]// Proceeding of the Multimedia Computing and Networking 2002. San Jose, California: ACM Press, 2002:156 - 170.
  • 9Wilson D. CacheLogic Study-P2P is Changing. [EB/OL] (2005-9-16). http://www. slyck, com/story914_ CacheLogic_ Study- P2P- is- Changing.
  • 10Subhabrata S, Wang J. Analyzing peer-to-peer traffic across large networks [C]// The 2nd Internet Measurement Workshop. Marseille, France: ACM Press, 2004: 219-232.

共引文献27

同被引文献38

  • 1张利军,李战怀,王淼.基于位置信息的序列模式挖掘算法[J].计算机应用研究,2009,26(2):529-531. 被引量:12
  • 2张坤,朱扬勇.无重复投影数据库扫描的序列模式挖掘算法[J].计算机研究与发展,2007,44(1):126-132. 被引量:17
  • 3陈敏,张广兴,毕经平.基于SIP的VoIP流量识别方法研究[J].计算机应用研究,2007,24(4):301-303. 被引量:11
  • 4OHZAHATA S,HAGIWARA Y,TERADA M,et al.A traffic iden-tification method and evaluations for a pure P2P application [ C ]//Proceedings of 2005 Passive and Active Network Measurement(PAM' 05).Berlin:Springer-Verlag,2005:55-68.
  • 5NGUYEN T,ARMITAGE G.A survey of techniques for internet traffic classification using machine learning [ J ].Communications Surveys & Tutorials,IEEE,2008,10(4):56-76.
  • 6KARAGIANNIS T,PAPAGIANNAKI K,FALOUTS M.BLINC:mul-tilevel traffic classification in the dark[ C]//ACM SIGCOMM Com-puter Communication Review.New York:ACM,2005:229-240.
  • 7KIM H,CLAFFY K C,FOMENKOV M,et al.Internet traffic clas-sification demystified:myths,caveats,and the best practices [ C ]//Proceedings of the 2008 ACM CoNEXT Conference.New York:ACM,2008:121-132.
  • 8GRINGGOLI F,SALGARELLI L,DUSI M,et al.Gt:picking up the truth from the ground for internet traffic[ J].ACM SIGCOMM Computer Communication Review,2009,39(5):12-18.
  • 9ROUGHAN M,SEN S,SPATSCHECK O,et al.Class-of-service mapping for QoS:a statistical signatu-re-based approach to IP traffic classification[C] //Proc.the 4th ACM SIGCOMM Conference on Internet Measurement.[S.l.] :ACM Press,2004:135-148.
  • 10SEN S,SPATSCHECK O,WANG D.Accurate,scalable in-network identificationof P2P traffic using application signatures[C] //Proc.13th International Conference on World Wide Web.[S.l.] :ACM Press,2004:512-521.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部