Font Size: a A A

Technology Security Regulatory Strategy Research On Mobile Internet P2P

Posted on:2013-05-10Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhengFull Text:PDF
GTID:2248330395985884Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
In recent years, domestic and foreign journals, magazines and other mobile Internettrend analysis chart can show a mobile peer-to-peer network of research and application isincreasingly attention by industry and academia, there is no lack of among them there areworld’s well-known enterprises, universities and research institutes. Their research scopeinvolves the realization of the mobile Internet applications, mobile Internet, mobileInternet topology discovery, data retrieval, many aspects, such as mobile Internet securitycontrol of security controls is a very key in the study of MP2P network technology. MP2Pnetwork in the network topology changes frequently, mobile MP2P resources restricted bymany factors such as node itself makes MP2P network in the mobile Internet andtraditional nature of the P2P network has a lot of difference, so, MP2P network securitycan’t continue to use traditional P2P network security monitoring strategy. Aiming at thepresent stage of MP2P research present situation, it is necessary for MP2P networksecurity monitoring in the strategy of in-depth analysis and research.First of all, simply introduces the P2P network and MP2P network application and thepresent situation of the research. Then to P2P networks and mobile P2P network securitysupervision were compared, and analysis of MP2P network which technical problemexisted in security. Finally, around a MP2P safety regulation the key technical problems offive aspects (suspected MP2P traffic extraction, MP2P traffic detection, MP2P trafficmonitoring, detecting and tracing of MP2P node) in-depth analysis and research. Next isthe work of this thesis mainly has carried on the brief overview.Mobile Internet is the extraction of MP2P traffic flow monitoring in the premise. Thirdchapter of this paper puts forward a suspected MP2P traffic based on multidimensionalscaling analysis to extract, narrowing the scope of MP2P traffic detection and control,make of the mobile Internet MP2P detection accuracy is higher, in improves in the mobileInternet MP2P detection efficiency. Due to the mobile Internet has its inherentcharacteristics, a lot of many of the traditional P2P traffic detection and flow control approach no longer applies to MP2P traffic detection and control. This paper based onneural network is proposed in the third chapter MP2P traffic detection and control method,and through experimental simulation, verify the feasibility of this method. As MP2Pbusiness is finding wider and wider application, MP2P just rely on traffic safety detectionand control is far from reach ideal effect, in order to further analysis of MP2P nodebehavior, the fourth chapter of this paper puts forward the active detection of MP2P nodeand node traceability solution. And mined by data mining algorithm is associated with thenode’s identity information, provide effective management and control of MP2P node withthe corresponding electronic evidence.
Keywords/Search Tags:MP2P, Safety monitoring Mobile, peer-to-peer networks, Data Mining
PDF Full Text Request
Related items