Font Size: a A A

Dpi-based P2p Application Identification And Traffic Control

Posted on:2011-11-26Degree:MasterType:Thesis
Country:ChinaCandidate:W HuangFull Text:PDF
GTID:2208330335997316Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet, parallel to the traditional C/S mode, the P2P-based applications also enjoyed rapid development. Because of its particularity, P2P protocol demonstrates far better efficiency in resource sharing and data transmission than the traditional C/S mode. As a result, the extensive use of P2P applications has exerted such a negative impact on the normal web operations that webmasters of ISPs, enterprises and institutions have to take measures to curb P2P applications.P2P traffic identification and control technology is the core of P2P application control. In order to effectively manage and control P2P applications, major companies and research institutions have increased investment on the research of P2P identification and control technology. Moreover, with the progress of technology that disturbs P2P traffic identification and control, P2P traffic identification and control technology has also been renewed and updated on an ongoing basis.Based on an in-depth analysis of several of the most widely used P2P application protocols and complemented by the existing P2P traffic identification and control technologies, this article analyzes the technological difficulties in the development of P2P traffic identification and control technology. Then the author proposes two methods for the accurate identification of P2P traffic as well as a method for P2P application bypass interference. These three methods are analyzed through application, as is shown in the examples.This paper reports tests of the proposed methods for traffic identification in the experimental environment and the actual environment of application to verify their rates of detection and false alarms. Results show that the traffic identification methods proposed in this paper can accurately identify the traffic of P2P applications in both environments, which further validates the effectiveness of these methods.
Keywords/Search Tags:P2P, traffic identification, communication primitives, MSE/PE
PDF Full Text Request
Related items