Since the emergence of peer-to-peer (P2P) networking in the late'90s , P2P applications have multiplied, evolved and established themselves as the leading growth applications of Internet traffic workload. In contrast to first generation P2P networks which used well-defined port numbers, current P2P applications have the ability to disguise their existence through the use of several obfuscation techniques, including dynamic port numbers, port hopping, HTTP masquerading, and encrypted payloads. As P2P applications continue to evolve, robust and effective methods are needed for P2P traffic identification.This paper we began with the work principle of P2P protocol,then we analyze the present status of P2P applications and typical P2P applications.The works this paper has done list as follows:1.Research several current P2P traffic identification solutions. Analyze the characteristics and problems in these solutions.2.A new methodology for P2P (peer-to-peer) host recognition is present in the paper, in which the transport layer connection characteristics of P2P Protocols is used.In this paper,we introduced the basic theory of this methodology ,NetFlow data format and the correlative knowledge of Support Vector Machines.3.Designed and implemented the P2P traffic identification system based on the methodology present in the paper.We introduced the Framework and the implement mechanism of this P2P traffic identification system and then elaborated on the moduls.4.We experiment the P2P traffic identification system in real network and analyzed the result of the experiment. |