期刊文献+

基于行为特征描述的P2P流识别方法的研究 被引量:5

Research of Identification Method Based on P2P Flow Behavior Characterization
在线阅读 下载PDF
导出
摘要 提出了一种基于行为特征描述的P2P流识别算法(BCCIA).首先建立了基于行为特征描述的P2P流的规范化统一描述,并定义了关键字的文法规则.接着,在BCCIA算法中,采用基于均匀分布的Hash函数来实现匹配和加快匹配速度,并详细阐述了模式识别的具体实现步骤.最后,在Linux环境下,以Skype为例进行仿真试验.实验数据表明,采用BCCIA算法,可以很好地实现分类和标识P2P流. This paper presents a P2P flow identification algorithm based on behavior characteristic characterization (BCCIA). Firstly, BCCIA sets up a kind of P2P flow standardization description on behavior characteristic, and defines some grammars of keywords. In BCCIA,an equal distributing Hash function is adopted to realize matching and quicken matching speed, and then realization steps of mode identification are described. Finally, in Linux circumstance, many experiments on Skype are processed. The experiment results indicate that BCCIA can classify and identify P2P flow perfeetly.
出处 《小型微型计算机系统》 CSCD 北大核心 2007年第1期48-53,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60573141)资助 教育部和南京市归国人员基金项目资助 华为基金资助.
关键词 行为特征描述 识别算法 P2P流 SKYPE behavior characteristic characterization identification algorithm P2P flow Skype
  • 相关文献

参考文献12

  • 1Thomas Karagiannis,Andre Broido,Michalis Faloutsos,et al.Transport layer identification of P2P traffic[C].IMC′04,October 25-27,2004,Taormina,Sicily,Italy.Copyright 2004 ACM:121-134.
  • 2李江涛,姜永玲.P2P流量识别与管理技术[J].电信科学,2005,21(3):57-61. 被引量:43
  • 3Subhabrata Sen,Oliver Spatscheck,Dongmei Wang.Accurate,scalable in-network identification of P2P traffic using application aignatures[C].WWW2004,May 17-22,2004,New York,USA.ACM.,512-521.
  • 4Cyril Soldani.Peer-to-peer behaviour detection by TCP flows analysis[R].University of Liege Faculty of Applied Sciences,2004,5.
  • 5Thomas Karagiannis,Andre Broido,Nevil Brownlee,et al.File-sharing in the internet:a characterization of P2P traffic in the backbone[R].Technical Report,University of California,Riverside,USA,2003.
  • 6Thomas Karagiannis,Andre Broido,Nevil Brownlee,et al.Is P2P dying or just hiding[C].IEEE Communications Society,Globecom 2004,Nov.-Dec.2004,3(29):1532-1538.
  • 7周晋,李衍达.基于Small-World网络的非结构化DHT算法[J].计算机研究与发展,2005,42(1):109-117. 被引量:7
  • 8陈贵海,须成忠,沈海英,叶懋,刘之育.一种新的常数度数的P2P覆盖网络[J].计算机学报,2005,28(7):1084-1095. 被引量:16
  • 9钟诚,陈国良.PRAM和LARPBS模型上的近似串匹配并行算法[J].软件学报,2004,15(2):159-169. 被引量:19
  • 10Gerber A,Houle J,Nguyen H,et al.P2P the gorilla in the cable[C].In:National Cable & Telecommunications Association (NCTA) 2003 National Show,Chicago,IL,June 2003.

二级参考文献48

  • 1Part 2: The Secure Hash Algorithm (SHA-1). American National Standard X9.30.2-1997: Public Key Cryptography for the Financial Services Industry. Washington. D C. American National Standards Institute. 1997.
  • 2S. Milgram. The small world problem. Psychology Today. 1967.2:60--67.
  • 3D. J. Watts. S. H. Strogatz. Collective dynamics of small-world networks. Nature. 1998. 393:440--442.
  • 4J. Kleinberg. The small world phenomenon: An algorithmic perspective. Cornell Computer Science. Tech. Rep. : 99-1776.2000.
  • 5Morpheus. http ://www. morpheus-os. com. 2004-11-11.
  • 6Napster. http ://www. napster. com. 2004-11-11.
  • 7Neil Daswani. Hector Garcia Molina. et al. Open problems in data-sharing peer-to-peer systems. The 9th Int'l Conf. onDatabase Theory (ICDT). Siena. Italy. 2003.
  • 8B. Zhao. J. Kubiatowicz. A. Joseph. Tapestry : An infrastructure for fault-tolerant wide area location and routing.Computer Science Division. U C Berkeley. Tech. Rep. UCB/CSD-01q 141. 2001.
  • 9A. Rowstron. P. Druschel. Pastry: Scalable. distributed object location and routing for large scale peer-to peer systems.Middleware 2001. Herdelberg. Germany. 2001.
  • 10S. Ratnasamy. P. Francis. M. Handley. et al. A scalable content-addressable network. SIGCOMM' 01. San Diego. CA.2001.

共引文献81

同被引文献52

  • 1杨林,刘聪,徐慧,张宵龙.P2P流实时识别技术研究[J].计算机科学,2012,39(S2):86-87. 被引量:3
  • 2张云飞,雷连虹,陈常嘉.Internet中Peer-to-Peer应用流量测量与分析[J].铁道学报,2004,26(5):55-60. 被引量:7
  • 3董旭,魏振军.一种加权欧氏距离聚类方法[J].信息工程大学学报,2005,6(1):23-25. 被引量:32
  • 4陈亮,龚俭,徐选.基于特征串的应用层协议识别[J].计算机工程与应用,2006,42(24):16-19. 被引量:43
  • 5刘元勋,徐秋亮,云晓春.面向入侵检测系统的通用应用层协议识别技术研究[J].山东大学学报(工学版),2007,37(1):65-69. 被引量:5
  • 6Bartlett G, Heidemann J, Papadopoulos C. Inherent Behaviors for Online Detection of Peer- to- Peer File Sharing [ C ]//In Proceedings of 10th IEEE Global Internet Symposium (GI ' 07 ) in conjunction with IEEE INFOCOM 2007. Anchorage, AK, USA: [s. n. ],2007:55- 60.
  • 7Pereira R L, Vazao T, Rodrigues R. Adaptive ,Search Radius- Lowering Internet P2P File Sharing Traffic through Self - Restraint [ C ]//in The 6th IEEE International Symposium on Network Computing and Applications ( IEEE NCA07), [s. 1,]: [s. n. ] ,2007:253 - 256.
  • 8Zander S, Nguyen T, Armitage G. Automated Traffic Classification and Application Identification using Machine Learning [C]//In:Proceedings of the IEEE Conference on Local Computer Networks ( LCN 2005 ). Sydney, Australia: [ s. n. ], 2005 : 250 - 257.
  • 9KARAGIANNIS T, BROIDO A, FALOUTSOS M,et al. Transport layer identification of P2P traffic [ C]//Prec of the 4th ACM SIGCOMM Conference on Intemet Measurement Table of Contents. New York: ACM Press ,2004 : 121-134.
  • 10WON Y J,PARK B C,JU H T,et al. A hybrid approach for accurate application traffic identification [ C ]//Proc of the 4th IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services. Vancouver: [ s. n. ] ,2006 : 1-8.

引证文献5

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部