Font Size: a A A

Research And Design Of P2P Flow Identification And Control Program

Posted on:2014-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:P H LiuFull Text:PDF
GTID:2248330398972017Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of P2P technology, the exchange of messages between people become easy, quick and frequent. The rapid development of P2P technology brought great convenience to human society, it also raised a series of questions. P2P applications such as Thunder, PPS network TV takes up lots of bandwidth, even lead to network congestion, and seriously affect the performance of other network applications, increase the carrier’s operating costs. Abuse of P2P technology also causes copyright issues, user by P2P technology to download unauthorized video works seriously affect the interests of the copyright. Even more serious is the huge security problem, while using P2P technology to transfer files, Trojan horses, viruses. With the file is transmitted in the network, seriously endanger network security. Therefore, how to effectively solve these problems has become the current hot issues discussed, the key to solve the problem is how to correctly identify P2P flow, and then control the identify flow.In order to distinguish and control the P2P flow, this paper describes in detail the topology of the P2P technology and network characteristics, flow characteristic, application field; this article describes the current P2P flow identification technology; analyzes the advantages and disadvantages of traffic identification technology; designs P2P traffic identification scheme based on the port identification technology, DPI technology and DF1technology. This article analyzes the advantages and disadvantages and research status of string matching technology. This paper describes the flow control technology, and presents a joint deployment program. This paper introduces the design of P2P traffic identification and control scheme, presents P2P flow identification and control system and detailed design of the system main modules, and introduces works and processes of data stream acquisition module, traffic identification module, flow control module works and processes.This article carries on the system functional testing and performance testing, test results show that the system can identify P2P traffic using dynamic random port, encryption traffic and new P2P traffic; when system issues a blocking strategy, P2P traffic is well controlled, and does not affect the use of the other software, the system completes the expected result.
Keywords/Search Tags:P2P, distinguish, control, character matching, test
PDF Full Text Request
Related items