Font Size: a A A

Analysis And Realization Of P2P Application Identifying System Basing On Protocol Signature Description Language

Posted on:2013-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:C LuoFull Text:PDF
GTID:2218330371498528Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
The bandwidth of Internet Service Provider can be fully utilized by popular P2Pbroadband tools, but in order to escape from supervision, dynamic ports and encryptedcommunications data are idiomatically employed by them, in the event, a lot of bandwidthis occupied by encrypted flow. At present, improving matching algorithm is commonlyused by traditional application layer protocol identification methods to raise identificationrate, but with the development of P2P protocol, features are multi-dimensional, andalgorithms are more complex too. In view of this, with the pretreatment by analyzingtypical P2P applications, a kind of custom protocol description language is designed toextract signatures of P2P applications and achieve a protocol signature identfying system,this strategy is approved feasible and effective through experiments.The first chapter of this thesis discusses the necessity for precise identification of P2Papplications from the perspective of business marketing and bandwidth management;Chapter II analyses application recognition technology on the basis of current development,focuses on the development of P2P applications and problems of identificationmethods,have proposed the basic idea for transform; the third chapter discusses theidentification of key optimization algorithm, the generalized concept of signatures with thedescription methods for it, and the optimization of data processing algorithm; Chapter IVdesigns system structure for the new scheme, distributes function of each module andexplore the implementation details; Chapter V tests the key indicators of the system, andtakes a comparative analysis with other existing systems for difference and advantage;Chapter VI takes a summary of this thesis, and Proposes four requirements to the futurework.
Keywords/Search Tags:Peer to peer, Encrypted traffic, Generalized signature, Protocolsignature description language, Priority scheduling
PDF Full Text Request
Related items