Font Size: a A A

A Research Of P2P Traffic Identification Based On Characteristic Process

Posted on:2011-06-16Degree:MasterType:Thesis
Country:ChinaCandidate:S Y WangFull Text:PDF
GTID:2178330305460434Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the popularity and development of the Internet, there are many P2P applications appeared, which took more and more Internet broadband. The survey shows that the increasing of P2P traffic has brought about enormous consumption of network broadband, and reduced other normal applications performance seriously, particularly in the enterprises. Therefore, identification of P2P traffic has become a key issue.Early P2P applications commonly used fixed port numbers to transfer data. But with the development of P2P technology, P2P applications use several obfuscation techniques to avoid detection, including random port numbers, HTTP masquerading and encrypted payloads. In 2003, Subhabrata Sen provide an issue which topic is Analyzing peer-to-peer traffic across large networks. In 2005, Dedinski provide a Active Networking base Cross-layer traffic identification and optimization method, which can fast identifyP2P traffic.At the beginning of 2010, many P2P applications have already upgraded. The new application use encryption techniques, such as camouflage protocols, encryption IP destination address and so on, which make many identifications of P2P traffic, became ineffective. So a new identification technology of P2P traffic is needy.This research is at the background of the characteristics of P2P traffic. The main contents are listed as following:(1) Analysis the current existence of several typical P2P traffic identification program works, and identifying the characteristics and problems of P2P traffic.(2) After analysis of the current principles and characteristics, this issue provide a rapid P2P Traffic technology which can effectively raise the P2P stream recognition rate and speed.(3) Provide a rapid P2P Traffic Identification model Based on Characteristic Process. (4) Combined with flow analysis tools-Sniffer, this paper at the base of the rapid identification of P2P traffic programs tested the effectiveness of this research, and analysis the performance of the experimental program.
Keywords/Search Tags:P2P, Active Network, Traffic, Traffic Identification, Characteristic Process
PDF Full Text Request
Related items