Font Size: a A A

The Research Of P2P Application Protocol Based On The Deep Packet Inspection Technology

Posted on:2013-09-28Degree:MasterType:Thesis
Country:ChinaCandidate:J S XuFull Text:PDF
GTID:2248330371459367Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of computer networks, network security issues are becoming increasingly serious. When the users in the network are from all sections and depart-ments of society, a lot of network storage and transmission of data require protection. Since the internet can provide audio, video service, broadband internet users has risen sharply. The purpose of the internet is a lot of users can download audio and video files quickly. This leads to a limited number of internet audio and video servers are often in the state of overloading to work, some media servers after another visit to the large number of users or even are paralyzed. In this case, P2P users are welcome, because this way of work solves the problem that the centralized media server may be the bottleneck. Therefore, the increasingly widespread application of P2P software management and control is especially important. In this paper, deep packet filtering technology, combined with the computer network works on the popular P2P software, and protocol analysis for feature extraction, the extracted features are written in snort rules and loaded into the instruction prevention system and can be effective for p2p software control, while the application protocol is done in deep research. P2p software control technology can be used in local area network or a small company. It will be the effective implementation of the common P2P software control.Popular P2P software, include a variety of categories:traditional protocol category, instant communications category, the stock category, download category and network television category. In this paper, intrusion prevention system is an example of the above categories and a detailed introduction.
Keywords/Search Tags:P2P, control, computer network theory, application protocol analysis
PDF Full Text Request
Related items