期刊文献+

基于有效载荷分析的BT流量识别技术 被引量:8

Technology for identifying BT traffic based on payload analysis
在线阅读 下载PDF
导出
摘要 为提高现有BT流量识别技术的准确性,通过分析BT协议和BT实际传输数据,找出BT传输过程中必会出现的各种固定字串,以之作为特征字串,从而利用增加特征字串个数来提高识别准确性。实验表明,对比现有的技术,该方法能提高识别的准确性,克服因未捕获握手包而无法识别数据流的缺陷。 To enhance the accuracy of the existing technologies for identifying BitTorrent (BT) traffic, the firxed strings that appeared in BT transmission process without failure were found out by analyzing BT protocol and BT transmission data, and set to be characteristic strings, consequently enhanced the accuracy by increasing the number of characteristic strings. Compared with the existing technologies, the method can enhance the accuracy of identification and overcome the limitation that data traffic cannot be identified because of missing hand-shake packet.
出处 《计算机应用》 CSCD 北大核心 2007年第9期2230-2232,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(60673155)
关键词 网络流量 协议识别 特征字串 network traffic protocol identification characteristic string
  • 相关文献

参考文献6

  • 1SAROIU S,GUMMADI K,DUNN R,et al.An analysis of Internet content delivery systems[C]// Proceedings of the 5th Symposium on Operating Systems Design and Implementation.New York:ACM Press,2002:315-328.
  • 2KIM M S,WON Y J,HONG J W K.Application-level traffic monitoring and an analysis on IP networks[J].ETRI Journal,2005,27(11):22-42.
  • 3SEN S,WANG J.Analyzing peer-to-peer traffic across large networks[J].IEEE/ACM Transaction on Networking,2004,12(2):219-232.
  • 4SEN S,SPATSCHECK O,WANG D.Accurate,Scalable in-network identification of P2P traffic using application signatures[C]// Proceedings of the 13th International conference on World Wide Web.New York:ACM Press,2004:512-521.
  • 5刘刚,方滨兴,胡铭曾,张宏莉.BitTorrent流量的捕获方法及自相似性的评价[J].计算机应用研究,2006,23(5):205-206. 被引量:9
  • 6陈亮,龚俭,徐选.基于特征串的应用层协议识别[J].计算机工程与应用,2006,42(24):16-19. 被引量:43

二级参考文献19

  • 1K Park, W Willinger. Serf-Similar Network Traffic and Performance Evaluation[ M ]. Wiley-Interscience Reprint, 2000.
  • 2Dongyu Qiu, R Srikant. Modeling and Performance Analysis of Bit Torrent-Like Peer-To-Peer Networks [J]. ACM SIGCOMM Computer Communication Review, 2004, 34(4) :367-378.
  • 3Shubho Sen, Jia Wang. Analyzing Peer-to-Peer Traffic Across Large Networks [ J ]. ACM/IEEE Transactions on Networking, 2004, 12(2) :219-232.
  • 4BitTorrent[ EB/OL]. http://bittorrent. sourceforge.net,2004.
  • 5Vern Paxson, Sally Floyd. Wide-Area Traffic:The Failure of Poisson Modeling [ J ]. IEEE/ACM Transactions on Networking, 1995,3 ( 3 ) :226 - 244.
  • 6Sdfd A Feldmann, A C Gilbert, et al. The Changing Nature of Network Traffic : Scaling Phenomena[ J ]. ACM Computer Communication Review, 1998, 28:5- 29.
  • 7Subhabrata Sen,Jia Wang.Analyzing Peer-to-Peer Traffic across Large Networks[C].In:IEEE/ACM Transactions on Networking,NJ:IEEE Press,2004:219~232
  • 8IANA[S].http://www.iana.org/assignments/port-numbers
  • 9Myung-Sup Kim,Young J Won,James Won-Ki Hong.Application-Level Traffic Monitoring and an Analysis on IP Networks[J].ETRI Journal,2005;27(11):22~42
  • 10Subhabrata Sen,Oliver Spatscheck,Dongmei Wang.Accurate,Scalable In-Network Identification of P2P Traffic Using Application Signatures[C].In:Proceedings of the 13th international conference on World Wide Web,NY:ACM Press,2004:512~521

共引文献50

同被引文献49

引证文献8

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部