期刊文献+

基于TCP三次握手特性的高效连接管理方法 被引量:6

Efficient Connection Management Method Based on TCP Three-way Handshake Characteristic
下载PDF
导出
摘要 为提升高速网络环境下的数据包处理与分析性能,基于传输控制协议(TCP)的三次握手特性,提出一种高效的连接管理方法,即待建连接缓冲法(ECB)。在分析IP网络中TCP连接建立过程特点的基础上,将待建连接从整个连接表中分离出来以单独进行缓冲,对数据包进行分类,给出每类数据包的连接管理实现流程。借助实际高速网络的流量样本,对ECB连接管理法进行性能评估,实验结果表明,ECB的查找性能比传统的单连接表管理方法提高近50%以上。 To promote the performance of packet processing and analysis in high-speed network, this paper proposes an efficient connections management method, Establishing Connection Buffering(ECB), in virtue of the characteristics of the three-way handshake in Transmission Control Protocol(TCP). Based on the analysis of TCP connection establishment process in IP network, it presents the design methodology that isolates establishing connections from whole connection table and buffers it separately. As a further step, it classifies packets into several types and gives the implementation of connection management for each type. It evaluates the performance of the ECB connection management with real high-speed network traffic trace. Experimental results indicate that the ECB performs almost 50% better than the traditional one with single connection table in terms of looku~ uerformance.
出处 《计算机工程》 CAS CSCD 2013年第11期83-86,90,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61303043 61202439) 湖南省教育厅科学研究基金资助项目(11C0036)
关键词 高速网络 连接管理 传输控制协议 三次握手 待建连接缓冲 high-speed network connection management Transmission Control Protocol(TCP) three-way handshake EstablishingConnection Buffering(ECB)
  • 相关文献

参考文献10

  • 1Dharmapurikar S, Paxson V. Robust TCP Stream Reassembly in the Presence of Adversaries[C]//Proc. of the 14th Conference on USENIX Security Symposium. Baltimore, USA: ACM Press, 2005.
  • 2Thompson K, Miller G, Wilder R. Wide-area Internet Traffic Patterns and Characteristics[J]. IEEE Communications Society, 1997, 11(6): 10-23.
  • 3Song Haoyu, Dharmapurikar S, Turner J, et al. Fast Hash Table Lookup Using Extended Bloom Filter: An Aid to Network Processing[J]. ACM SIGCOMM Computer Com- munication Review, 2005, 35(4): 181-192.
  • 4Li Xin, Ji Zhengzhou, Hu Mingzeng. Stateful Inspection Firewall Session Table Processing[J]. International Journal of Information Technology, 2005, 11(2): 21-30.
  • 5Roesch M. Snort-lightweight Intrusion Detection for Net- works[C]//Proc. of the 13th USENIX Conference on System Administration. Seattle, USA: ACM Press, 1999.
  • 6Paxson V. Bro: A System for Detecting Network Intruders in Real Time[J]. Computer Networks, 1999, 31(23): 2435-2463.
  • 7熊兵,廖年冬,李峰,陈晓苏.基于网络数据流局部性的连接管理优化方法[J].计算机工程,2011,37(24):86-87. 被引量:2
  • 8Oh J, Kim B, Yoon S, et al. Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System[J]. International Journal of Computer Science and Network Security, 2007, 7(5): 110-117.
  • 9Yoon S, Kim B, Oh J, et al. High Performance Session State Management Scheme for Stateful Packet Inspection[C]//Proc. of the 10th Asia-Pacific Conference on Network Operations and Management Symposium: Managing Next Generation Networks and Services. Berlin, Germany: Springer-Verlag, 2007.
  • 10Kim H, Kim J H, Kang I, et al. Preventing Session Table Explosion in Packet Inspection Computers[J]. IEEE Transactions on Computers, 2005, 54(2): 238-240.

二级参考文献7

  • 1Song Haoyu, Dharmapurikar S, Turner J, et al. Fast Hash Table Lookup Using Extended Bloom Filter: An Aid to Network Processing[J]. ACM SIGCOMM Computer Communication Review, 2005, 35(4): 181-192.
  • 2Paxson V. Bro: A System for Detecting Network Intruders in Real Time[J]. Computer Networks, 1999, 31(23): 2435-2463.
  • 3Li Xin, Ji Zhengzhou, Hu Mingzeng. Stateful Inspection Firewall Session Table Processing[J]. International Journal of Information Technology, 2005, 11(2): 21-30.
  • 4Oh J, Kim B, Yoon S, et al. Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System[J]. International Journal of Computer Science and Network Security, 2007, 7(5): 110-117.
  • 5Gulati N, Williamson C, Bunt R. LAN Traffic Locality: Characteri- zation and Application[C] //Proc. of the 1st International Confer- ence in Local Area Network Interconnection. New York, USA: Plenum Publishing Corporation, 1993: 233-250.
  • 6Williamson C. Internet Traffic Measurement[J]. IEEE Internet Computing, 2001, 5(6): 70-74.
  • 7苏晓珂,兰洋,秦玉明,万仁霞,程耀东.混合属性数据流的两阶段入侵检测算法[J].计算机工程,2010,36(18):19-20. 被引量:2

共引文献1

同被引文献38

引证文献6

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部