期刊文献+

基于会话的局域网P2P流量识别方法的研究

Research on Method of Session-Based P2P Network Traffic Identification
在线阅读 下载PDF
导出
摘要 随着P2P技术的发展,很多P2P软件采用了新的技术改善局域网用户的传输质量,导致P2P数据传输中出现了新的特征。针对STUN协议,在多元分类的基础上,提出了一种基于会话的P2P流量识别算法。首先介绍了STUN协议建立会话的消息格式,并描述了几种不同类型NAT建立地址映射的过程。算法采用多元组描述会话,建立二叉树结构对收发的数据包依次进行分析,识别P2P会话,最后以哈希表存储会话状态。在Linux环境下,以迅雷为例进行实验,结果表明采用本算法可以很好地识别P2P数据流。 With the development of P2P technology, a lot of P2P applications introduced new technology to improve the transmission quality of the local area network,leading P2P data transmission in the emergence of new features. Presents a P2P identification algorithm based on session behavior characterization which targets STUN by multiple classification analysis. Firstly, STUN packet format for establishing a session is included to illustrate how all kinds of NATs acquire mapped address. Algorithm uses multi - group description of the session, the establishment of a binary tree structure on the analysis of data packets sent and received to identify P2P session, and uses the hash table to store session state. Finally, in Linux circumstance, many experiments on thunder are processed. The experiment results indicate that the algorithm can identify P2P traffic perfectly.
作者 宫博 王汝传
出处 《计算机技术与发展》 2010年第3期5-8,共4页 Computer Technology and Development
基金 国家自然科学基金(60773041) 江苏省自然科学基金(BK2008451) 国家高科技863项目(2007AA01Z404 2007AA01Z478) 2006江苏省软件专项项目 南京市高科技项目(2007软资127) 现代通信国家重点实验室基金(9140C1105040805) 江苏高校科技创新计划项目(CX08B-085Z CX08B-086Z) 江苏省六大高峰人才项目
关键词 识别 P2P 会话 NAT STUN identification P2P session NAT STUN
  • 相关文献

参考文献9

  • 1Karagiannis T,Broido A,Faloutsos M, et al. Transport layer identification of P2P traffic[ C]//Li Jiangtao,Jiang Yongling. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. Survey of P2P traffic identifieation and engineering technology. Taormina,Sieily, Italy: [s. n. ],2005.
  • 2李君,王攀,孙雁飞,王浩云.P2P业务流量识别、分析和控制研究[J].计算机工程,2006,32(11):122-124. 被引量:37
  • 3Sen S, Spaatscheck O, Wang Dongmei. Accurate, scalable in - network identification of p2p traffic using application signatures[ C]//Proceedings of the 13th international conference on World Wide Web. New York, NY, USA: [ s. n. ], 2004: 512 - 521.
  • 4陈宝钢,张凌,许勇,胡金龙,黄松.基于P2P应用的网络流量特征分析[J].计算机应用,2007,27(3):531-533. 被引量:7
  • 5石萍,陈贞翔,荆山,贾冠昕,杨波.基于对等特征的P2P流量识别方法[J].中国教育网络,2007(2):36-38. 被引量:9
  • 6刘琼,徐鹏,杨海涛,彭芸.Peer-to-Peer文件共享系统的测量研究[J].软件学报,2006,17(10):2131-2140. 被引量:37
  • 7Srisuresh P, Holdredge M. IP Network Address Translator (NAT) Terminology and Considerations[ S]. RFC 2663, IETF, 1999.
  • 8Rosenberg J ,Weinberger J ,Huitema C,et al. STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) [ S ]. RFC 3489, IETF, 2003.
  • 9李双庆,左建勋,路遥.基于ABV的BT流量识别与分类[J].计算机应用,2007,27(B06):166-167. 被引量:1

二级参考文献51

  • 1李江涛,姜永玲.P2P流量识别与管理技术[J].电信科学,2005,21(3):57-61. 被引量:43
  • 2Karagiannis T, Broido A, Faloutsos M, et al. Transport Layer Identification of P2P Traffic[C]. Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, Taormina, Italy, 2004.
  • 3P-Cube Inc. Approaches to Controlling Peer-to-Peer Traffic: A Technical Analysis[EB/OL]. http://www.pcube.com/doc_root/products/Engage/WP_Approaches_Controlling_P2P_Traffic_31403,pdf,2004.
  • 4Saroiu S, Gummadi PK, Gribble SD. A measurement study of peer-to-peer file sharing systems. In: Proc. of the Multimedia Computing and Networking 2002 (MMCN 2002). 2002. 156-170. http://www.cs.washington.edu/homes/gribble/papers/mmcn.pdf
  • 5Liang J, Kumar R, Ross KW. The KaZaA overlay: A measurement study. In: Proc. of the 19th IEEE Annual Computer Communications Workshop. 2004. http://cis.poly.edu/-ross/papers/KazaaOverlay.pdf
  • 6Liang J, Kumar R, Ross KW. Understanding KaZaA. 2004. http://cis.poly.edu/-ross/papers/UnderstandingKaZaA.pdf.
  • 7Liang J, Kumar R, Xi Y, Ross KW. Pollution in file sharing systems. In: Proc. of the IEEE Infocom 2005. 2005. http://cis.poly.edu/-ross/papers/pollution.pdf
  • 8Sen S, Wang J. Analyzing peer-to-peer traffic across large networks. In: Proc. of the 2nd ACM SIGCOMM Workshop on Internet Measurement Workshop. 2002. http://citeseer.ist.psu.edu/sen02analyzing.html
  • 9Karagiannis T, Broido A, Brownlee N, Claffy KC, Faloutsos M. Is P2P dying or just hiding. In: Proc. of the IEEE Globecom 2004. 2004. 1532-1538. http://www.caida.org/outreach/papers/2004/p2p-dying/p2p-dying.pdf
  • 10Soldani C. Peer-to-Peer behavior detection by tcp flows analysis (End-of-Study Dissertation). University of Liege, 2004. http://www.run.montefiore.ulg.ac.be/-soldani/P2P_Behaviour_Detection.pdf

共引文献84

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部