Font Size: a A A

Peer To Peer Traffic Identification Based On Traffic Characteristic

Posted on:2009-04-25Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2178360245979837Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Since the emergence of peer-to-peer (P2P) networking in the late'90s , P2P applications have multiplied, evolved and established themselves as the leading growth applications of Internet traffic workload. In contrast to first generation P2P networks which used well-defined port numbers, current P2P applications have the ability to disguise their existence through the use of several obfuscation techniques, including dynamic port numbers, port hopping, HTTP masquerading, and encrypted payloads. As P2P applications continue to evolve, robust and effective methods are needed for P2P traffic identification.This paper we began with the work principle of P2P protocol,then we analyze the present status of P2P applications and typical P2P applications.The works this paper has done list as follows:1.Research several current P2P traffic identification solutions. Analyze the characteristics and problems in these solutions.2.A new methodology for P2P (peer-to-peer) host recognition is present in the paper, in which the transport layer connection characteristics of P2P Protocols is used.In this paper,we introduced the basic theory of this methodology ,NetFlow data format and the correlative knowledge of Support Vector Machines.3.Designed and implemented the P2P traffic identification system based on the methodology present in the paper.We introduced the Framework and the implement mechanism of this P2P traffic identification system and then elaborated on the moduls.4.We experiment the P2P traffic identification system in real network and analyzed the result of the experiment.
Keywords/Search Tags:Peer to Peer, P2P Traffic Identification, Connection Characteristic, NETFLOW, SUPPORT VECTOR MACHINES
PDF Full Text Request
Related items