Font Size: a A A

The Network P2P Traffic Detection & Identification Research

Posted on:2012-02-23Degree:MasterType:Thesis
Country:ChinaCandidate:D Q YangFull Text:PDF
GTID:2218330338455734Subject:Detection Technology and Automation
Abstract/Summary:PDF Full Text Request
P2P new technology has been rapid developing Since the beginning of Napster in May,1999.Today,P2P traffic has been become the mainstream of Internet traffic.P2P traffic has occupied 50% of the total traffic at the beginning of 2002,based on statics, and it reached 60% today.P2P applications provide people with more and more utilities, but it also brought enormous negative impact, for example, taking up too much network bandwidth, deteriorating network security,etc.The identification of P2P traffic is the primary problem on managing P2P applications,it is important to protect network security.Firstly, this article based on the background of P2P application, P2P technology principles and applications are briefly explained. The principle, characteristics and the network topology of all kinds of P2P applications be introduced varied from history.And around the P2P traffic identify the center issues, this paper summarizes the characteristics and P2P traffic network characteristics.Secondly, the paper summarizes the P2P traffic recognition of the current research results of these methods are discussed from the principle, combine them recognition performance characteristics, and considering the current P2P traffic network characteristics based on feature yards that P2P traffic identification method is still a valid identification method, have further research and discussion of value and necessary.Finally, this paper further studied the identification method of P2P traffic based on signature, and put forward a method of signature is presented. And doing some experiments on typical network download software Thunder and PPlive to make use of ethereal software, the working principle of it from P2P application point of view is analyzed, the signature of it was extracted, and achieve the expected purpose.
Keywords/Search Tags:P2P, P2P traffic, Signature, Identification Traffic
PDF Full Text Request
Related items