Font Size: a A A

Research On P2P Flow Identification And Monitoring And Its Implementation

Posted on:2014-06-23Degree:MasterType:Thesis
Country:ChinaCandidate:J FanFull Text:PDF
GTID:2268330401465907Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the rapid development of technology of computer and network, the P2Papplication turns to be more and more popularized all over the world, and it hasobtained dramatic achievements in a short period. P2P application stimulates the growthof network and makes users’ life more convenient. However, network congestion andsecurity problems caused by P2P overusing resources, have seriously hindered thehealthy network service. Currently, how to identify and control P2P flow becomes a hottopic in this field.Based on situations above, according to the national major projects "mobileInternet research on network and information security" sub-project, relying on thefeatures of P2P flow, we have an in-depth investigation in the technology of P2P flowmonitoring in this thesis, explore an effective implementation of this monitoring system.Our work consists of following4parts:Firstly, we did some work on P2P technology. We conducted analysis the definitionof P2P, P2P application, technical characteristics and problems of P2P networks.Besides, weput emphasis on P2P flow identification technology and controltechnologyand invest in several strategies in this study to manage P2P flow.Secondly, aiming at some typical P2P applications, we provided a detailedprotocoldescription, and focused on MSN to implement the functions of identification,content filtering, and monitoring.Moreover, we investigated socializedanalysis of complex network and communitypartition based on potential function, and established the theoretical basis for socialnetwork diagram and network security mechanism.Finally, we established the environment of flow identification and monitoringsystem mentioned in this paper. We carried out simulations and analyzed the data.
Keywords/Search Tags:peer-to-peer, social network analysis, topology potential, protocol analysis, flow identification, monitoring
PDF Full Text Request
Related items