Font Size: a A A

Design And Implementation Of Network Traffic Control System

Posted on:2012-11-21Degree:MasterType:Thesis
Country:ChinaCandidate:L DuanFull Text:PDF
GTID:2178330335960921Subject:Information security
Abstract/Summary:PDF Full Text Request
The role of network traffic control system is the accurately control of the network traffic based on the needs of users. Applications on the network today keep on growing at a high speed, user access to resources more and more convenient. Take the P2P download traffic for example, in the past few years, P2P technology with more and more users is developing rapidly for its unique advantage and high speed, and according to statistics, P2P applications occupied 60% of normal network traffic, which exceed HTTP traffic and become the biggest consumer of network bandwidth, P2P has been already show a strong advantage in distributed computing and file sharing. At the same time P2P has brought us a lot of negative issues. Most P2P users download various resources with a high speed, which led to a sharp reduction in network bandwidth, so it could easily lead to block the network bandwidth; the other applications are not well protected. On the other hand, P2P applications is still particularity in the symmetric of upload traffic and download traffic, which easily lead to the block of traditional non-symmetric network (download traffic bandwidth much larger than the upload traffic bandwidth,). In order to monitor and analyze network bandwidth usage effectively, to control the BT download, online TV network from excessive using, and achieving an accurate control of the different applications, the network control system which targeted on local networks is proposed in this paper.This paper focuses on the key technologies of network traffic control system, especially on the encrypted P2P traffic identification proposal and the Linux Netfilter structure, and put forward a new network traffic control system on this basis. The system supports the commonly used DPI detection techniques and behavior detection technologies, which can basically meet the need of all kinds of network traffic identification and control. In this paper, the primary work includes:1. The paper researched and analyzed technology of network flow identification and network flow control, then contrasts their advantages and disadvantages.2. The paper studied and analyzed the development and features of P2P streams, then proposed two proposals in order to identify encrypted traffic of P2P traffic which are not well identified.3. The paper proposed a new traffic control system targeted on the local network. The system can achieve an accurate identification of network traffic, and can effective control the flows based on traffic management strategies, and it can also provide real-time and historical traffic queries.4. The paper designed and achieved the flow handle module, and also studied Netfilter structure of the Linux system, then had a detailed analysis of the packet storage and forwarding process, achieved an effective control combined with flow identification technology. The paper proposed the traffic limit algorithm to ensure the accuracy of the traffic control.5. The paper designed and achieved the web module, and have an detailed description of its functions.6. The paper analyzed the system in performance and function, the design achieved well in the demand. It also achieved good scalability and portability.
Keywords/Search Tags:Traffic control, DPI, Behavior identification, P2P, Netfilter Extension
PDF Full Text Request
Related items