期刊文献+

对等网络流量检测技术 被引量:9

Research on the Technology of Peer-to-Peer Network Traffic Identification
在线阅读 下载PDF
导出
摘要 对等网络(P2P)应用的飞速发展,丰富了互联网的内容,但其流量的爆发式增长和不加限制的带宽占用,不仅给互联网基础设施带来巨大冲击,也给Internet服务提供商(ISP)和应用服务提供商(ASP)的高级服务部署带来了很多问题。开展高效、准确的P2P流量实时识别与过滤相关技术研究,不仅有利于合理利用互联网基础设施、P2P技术和合理部署P2P应用,还有利于制止非法内容在P2P网络中的传播。该文通过对现有P2P流量识别算法进行深入研究和对比分析,为P2P流量有效管理和合理规范提供了技术参考。 The rapid development of Peer-to-Peer (P2P) network has enriched the performance of Internet. However, with the violent increment of data flow and bandwidth using with no restrict, the P2P applications have brought huge impact to Intemet base establishment and the advance service of Intemet Service Provider (ISP) and Application Service Provider (ASP). Therefore, to utilize the Internet base establishment and P2P technology correctly and to process P2P applications effectively, the technology of P2P network traffic identification and traffic filtering should be researched while restraining the illegal content being transfered in P2P network. This paper focuses on the deep research and comparison of available algorithms of P2P network traffic identification, and gives a technology reference and standard for the P2P network traffic management.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2007年第6期1333-1337,共5页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(60473090) 国家242信息安全专题计划项目(2006B19)
关键词 内容监管 对等网络 流量过滤 流量识别 content monitoring peer-to-peer network traffic filtering traffic identification
  • 相关文献

参考文献19

  • 1CISCO.NetFlow技术白皮书[EB/OL].http://www.cisco.com/,2007-08-12.
  • 2ALLOT.故障恢复流量管理方案[EB/OL].http://www.allot.com,2007-08-12.
  • 3CACHELOGIC.Cache Logic P2P管理方案[EB/OL].http://www.cachelogic.com,2007-08-12.
  • 4VERSO TECHNOLOGIES.NetSpective系列产品白皮书[EB/OL].http://www.verso.com/,2007-08-12.
  • 5华为公司.P2P流量(BT流量)监管技术白皮书[EB/OL].http://www.huawei.com,2007-08-12.
  • 6华为公司.Eudemon系列防火墙解决方案[EB/OL].http://www.huawei.com,2007-08-12.
  • 7SAN Subhabrata, WANG Jia, Analyzing peer-to-peer traffic across large networks[C]//IEEE/ACM Trans on Networking. [S.l.]: [s,n.], 2004: 219-232.
  • 8FIVOS C, PANAYIOTIS M, Identifying known and unknown peer-to-peer traffic[C]// In Proc. of Filth IEEE International Symposium on Network Computing and Applications. [S.l.]: [s.n.], 2006: 93-I02.
  • 9THOMAS K, ANDRE B, MICHALIS K Transport layer identification of P2P traffic[C]//In: Proc of the 4th ACM SIGCOMM Conf on Intemet Measurement. [S.l.]: [s.n.], 2004: 121-134.
  • 10HONG Mong-fong, CHEN Chun-wei, CHUANG Chin-shun. Identification and analysis of P2P traffic-an example of bit torrent[C]//Proc of Int'l Confon Innovative Computing, Information and Control (ICICIC2006). [S.l.]: [s.n.], 2006, 2: 266-269.

同被引文献89

引证文献9

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部