Font Size: a A A

Design And Implementation Of Network Traffic Inspecting System Based On P2SP

Posted on:2012-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:S X YuFull Text:PDF
GTID:2178330335960443Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology, the new network applications are emerging and the network structure gradually turns from the traditional C/S, B/S mode to P2P, P2SP application mode. Various of P2P, P2SP application takes up a large number of bandwidth resources, which causes network operators'operating costs increasing and rapid consumption of network bandwidth, it also causes a lot of intellectual property rights issues. According to statistics, P2P and P2SP applications have accounted for more than 60% of normal network traffic, becoming the largest consumer of network bandwidth. At the same time, the development of P2P and P2SP has also brought many negative issues, such as copyright problem. To solve these problems, many network supervision departments increase the regulatory authorities at the network traffic, meanwhile, the network operators are actively searching for new technical methods of P2SP network traffic for effective management.There have some solutions to these problems for P2P currently, but rare solutions of inspecting technology for P2SP traffic. In response to this situation, the paper focuses on how to supervise the P2SP network traffic in large scale network from the viewpoint of network operators.The paper focuses on P2P traffic inspecting technology and the working principle and controlling scheme of Thunder, which is the typical representative of P2SP application. Based on these researches, the paper designs and implements a new P2SP network taffic inspecting system. Specifically, the primary work of this paper includes the following aspects: 1. The paper researches and analyzes the typical P2P network traffic inspecting technologies and their respective characteristics, and combines the advantages of different traffic inspecting technologies to detect P2SP traffic.2. The paper researches and analyzes the working principle of P2SP, and analyzes the working principle and controlling scheme of Thunder, which is based on P2SP, and then proposes an effective disturbing and controlling scheme of Thunder.3. The paper proposes a new P2SP traffic inspecting system's framework, and introduces the system's overall design and the function of each module, and also introduces two kinds of system network disposition. The system can realize accuracy detection of P2SP network traffic, and can make different strategies for effective controlling of corresponding traffic.4. The paper highlights the system's key module, the protocol detection module, and it's design and implementation. Traffic Identification sub-module introduces the Module design, traffic identification, detection engine and feature detection's processes, and proposes the identification methods for the P2S and P2P of P2SP traffic, and then gives the behavior detection program of encrypted P2P traffic. Flow control sub-module introduces two kinds of control technology. Take Thunder for example, the paper introduces the bypass disturbance technology in detail, which uses forged packet in order to limit Thunder downloading speed.5. By using of the traffic inspecting technologies as studied, the paper deeply analyzes some common P2SP protocol software. And then the analysis results were written into system rules library to test its functionality and performances. According to the test results, the system's functionality and performance are qualified, with good scalability, stability, and operational advantages.
Keywords/Search Tags:P2SP, P2P, DPI, Disturbance, Network disposition
PDF Full Text Request
Related items