首页 | 官方网站   微博 | 高级检索  
     

一种混合式BitTorrent流量检测方法
引用本文:李麟青,杨哲,朱艳琴.一种混合式BitTorrent流量检测方法[J].计算机应用,2011,31(12):3210-3214.
作者姓名:李麟青  杨哲  朱艳琴
作者单位:1. 苏州大学 计算机科学与技术学院, 江苏 苏州 2150062. 苏州大学 江苏省计算机信息处理技术重点实验室, 江苏 苏州 215006
基金项目:国家自然科学基金资助项目,江苏省自然科学基金资助项目
摘    要:P2P流量已经成为互联网流量的主要部分,消耗大量的带宽,影响了服务质量,准确并实时检测出P2P流量有助于对P2P应用的监管,并研究其行为和发展。针对P2P流量中比例最大的BT流量,提出了一种混合式的检测方法。该方法由三个子方法构成,分别针对BT流量中的明文流、密文流和信令流进行检测,并预知即将发生的BT流量。实验结果表明,该方法的召回率、准确率和实时性,均优于目前实时性最好的几种机器学习方法。

关 键 词:流量检测    应用层签名    消息重组    信令分析
收稿时间:2011-05-16
修稿时间:2011-07-10

Hybrid BitTorrent traffic detection
LI Lin-qing,YANG Zhe,ZHU Yan-qin.Hybrid BitTorrent traffic detection[J].journal of Computer Applications,2011,31(12):3210-3214.
Authors:LI Lin-qing  YANG Zhe  ZHU Yan-qin
Affiliation:1. Provincial Key Laboratory for Computer Information Processing Technology, Soochow University, Suzhou Jiangsu 215006, China2. School of Computer Science and Technology, Soochow University, Suzhou Jiangsu 215006, China
Abstract:Peer-to-peer (P2P) applications generate a large volume of traffic and seriously affect quality of normal network services. Accurate and real-time identification of P2P traffic is important for network management. A hybrid approach consists of three sub-methods was proposed to identify BitTorrent (BT) traffic. It applied application signatures to identify unencrypted traffic. And for those encrypted flows, message-based method according to the features of the message stream encryption (MSE) protocol was proposed. And a pre-identification method based on signaling analysis was applied to predict BT flows and distinguish them even at the first packet with SYN flag. And some modified Vuze clients were used to label BT traffic in real traffic traces, which made high accuracy benchmark datasets to evaluate the hybrid approach. The results illustrate its effectiveness, especially for those un- or semi- established flows, which have no obvious signatures or flow statistics.
Keywords:traffic identification                                                                                                                          application signature                                                                                                                          message resembling                                                                                                                          signaling analysis
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号