期刊文献+

基于小包规律分析的BT流量识别技术

BT TRAFFIC IDENTIFICATION TECHNOLOGY BASED ON SMALL PACKET RULE ANALYSIS
下载PDF
导出
摘要 为提高在采样环境中Bernaille等的早识别技术对BT(BitTorrent)流量识别的准确性,通过分析BT协议和BT实际传输数据,找出其中BT传输过程前期有效载荷低于70个字节的小包出现的规律,并以此为基础来识别BT流量。实验表明,对比早识别技术,该方法能够提高在采样环境中识别的准确性,克服了早识别技术对BT流中前几个数据包的依赖的不足。 In order to enhance the correctness of Bernaille's Early Identification technology in BT traffic identification under sampling environment,BT protocols and BT actual transmission data are analyzed,rules of the occurrence of small packets whose effective payloads are less than 70 bytes during the early stages of BT transmission procedure are found out,which are taken as the basis for identifying BT traffic.Experiments show that,compared with Early Identification technology,the proposed method can enhance the identification correctness under sampling environment by conquering its lack of dependence on the first few data packets in BT flows.
作者 李明伟
出处 《计算机应用与软件》 CSCD 北大核心 2012年第1期237-240,共4页 Computer Applications and Software
关键词 P2P BT 流量识别 小包分析 P2P BT Traffic identification Small packet analysis
  • 相关文献

参考文献11

  • 1Sen S,Spatschck O,Wang D.Accurate,scalable in-network identification of P2P traffic using application signatures:proceedings of the 13th International World Wide Web Conference[C]//New York:ACM Press,2004:512-521.
  • 2Karagiannis T,Broido A,Faloutsos M,et al.Transport layer identification of P2P traffic[C]//IMC 2004.New York:ACM Press,2004:121-134.
  • 3Karagiannis T,Papagiannaki D,Faloutsos M.Blinc:multilevel traffic classification in the dark[C]//Proceedings of the 2005 SIGCOMM conference on Applications,Technologies,Architectures,and Protocols for Computer Communication.New York:ACM Press,2005:229-240.
  • 4Mcgergor A,Hall M,Lorier P,et al.Flow clustering using machine learning techniques[C]//Paesive and Active Measurement 2004.Heidelberg:Springer,2004:205-214.
  • 5李明伟,张大方,曾彬,黎文伟.基于有效载荷分析的BT流量识别技术[J].计算机应用,2007,27(9):2230-2232. 被引量:8
  • 6杜江,易鹤声.基于签名的P2P流量识别模型的设计与实现[J].计算机应用研究,2009,26(11):4315-4318. 被引量:1
  • 7Zander S,Ngiuem T,Armitage G.Automated trafic classification and application identification using machine learning[C]//Proceedings of the IEEE.Conference on Local Computer Networks 30th Anniversary,2005:250-257.
  • 8Ekman J,Arlitt M,Mahanti A.Traffic Classification Using Clustering Algorithms[C]//SIGCOMM 2006.New York:ACM Press,2006:281-286.
  • 9Bemaille L,Teixeira R,Akodkenou I,et al.Traffic classification on the fly[C]//SIG,COMM 2006.New York:ACM Prees,2006,36(2):23-26.
  • 10Bemaille L,Teixeira R,Salamatian K.Early Application Identification[C]//Proceedings of the 2006 ACM Conference on Emerging Networking Experiments and Technologies.New York:ACM Press,2006:70-82.

二级参考文献16

  • 1刘刚,方滨兴,胡铭曾,张宏莉.BitTorrent流量的捕获方法及自相似性的评价[J].计算机应用研究,2006,23(5):205-206. 被引量:9
  • 2陈亮,龚俭,徐选.基于特征串的应用层协议识别[J].计算机工程与应用,2006,42(24):16-19. 被引量:43
  • 3宫婧,孙知信,顾强.基于行为特征描述的P2P流识别方法的研究[J].小型微型计算机系统,2007,28(1):48-53. 被引量:5
  • 4KARAGIANNIS T, BROIDO A, FALOUTSOS M,et al. Transport layer identification of P2P traffic [ C]//Prec of the 4th ACM SIGCOMM Conference on Intemet Measurement Table of Contents. New York: ACM Press ,2004 : 121-134.
  • 5WON Y J,PARK B C,JU H T,et al. A hybrid approach for accurate application traffic identification [ C ]//Proc of the 4th IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services. Vancouver: [ s. n. ] ,2006 : 1-8.
  • 6KARAGIANNIS T, BROIDO A, BROWN'LEE N,et al. Is P2P dying or just hiding[ C]//Proc of IEEE Global Telecommunications Conference. 2004 : 1532-1538.
  • 7SEN S, SPATSCHECK O, WANG Dong-mei. Accurate, scalable innetwork identification of P2P traffic using application signatures [ C]//Proc of the 13th International Conference on World Wide Web Table of Contents. New York :ACM Press,2004:512-521.
  • 8MADHUKAR A,WILLIAMSON C. A longitudinal study of P2P traffic classification[ C]//Proc of IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems. 2006:179-188.
  • 9BLEUL H, RATHGEB E P,ZILLING S. Advanced P2P multi-protocol trattic analysis based on application level signature detection [ C ]//Proc of the 12th International Telecommunications Network Strategy and Planning Symposium. 2006 : 1-6.
  • 10SPOGNARDI A, LUCARELLI A, DI PIETRO R. A methodology for P2P file-sharing traffic detection [ C ]//Proc of the 2nd International Workshop on Hot Topics in Peer-to-Peer Systems. 2005:52-61.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部