Font Size: a A A

The Extraction Of P2P Traffic Signature And Identification Technology

Posted on:2010-03-15Degree:MasterType:Thesis
Country:ChinaCandidate:Z X WangFull Text:PDF
GTID:2178360278475653Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As P2P applications and the amount of users continue to increase rapidly, the problems which the Internet faces,such as network congestion and the difficulty in ersuring Qos etc,become more and more serious.Therefor,identification and control of P2P traffic has become a key issue.Early P2P applications commonly use fixed port number to transfer data. These P2P applications can be detected accurately through the port number. With the development of P2P protocols, however, current P2P applications use serveral obfuscation techniques to avoid detection, including radom port number, HTTP masquerading and encrypted payloads.This paper mainly uses deep packet inspection (DPI) and signatures of P2P protocols to identify P2P traffic.In this paper, we firstly analyze and research some popular applications, then we find out their signature strings, we also give a method to design a signature stings library. The system we implemented can sniff traffic in real-time and classify P2P applications according to the signature strings.This paper discusses and analyzes some string matching algorithms, including 2 single-pattern matching algorithms and 3 multi-pattern matching algoritnms. Then, we give a further research of 3 pattern matching algorithms and implement an experiment to compare their performance.Then, this paper presents an algorithm in order to find out possible signature strings automatically by analyzing P2P traffic.After that,this paper introduce the system needs,as well as the top10 statistical method and also we carry out experiments combined with ALLOT to verify the algorithm of finding out P2P traffic signature which be mentioned above.Finally, this paper gives a summarization of this paper and present the further work we will do.
Keywords/Search Tags:P2P, deep packet inspection, signature, multi-pattern matching algorithm
PDF Full Text Request
Related items