Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for recognizing P2P application encipher flux

An identification method and flow technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of inability to identify encrypted peer-to-peer network traffic and low identification accuracy.

Inactive Publication Date: 2009-05-27
合肥昊特信息科技有限公司
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Among them, since most P2P application softwares have their own unique feature fields when using plaintext transmission, the accuracy of using DPI technology to identify P2P traffic is relatively high, but it cannot identify encrypted peer-to-peer network traffic.
Since DFI technology does not need to analyze application layer data, although it can identify application layer encrypted data, the accuracy of identification is not high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for recognizing P2P application encipher flux

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The identification method of the P2P encryption application of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0018] The identification method of P2P application encrypted traffic in the present invention flexibly utilizes the characteristics of the P2P protocol information exchange process, and dynamically tracks and analyzes the node traffic in the P2P application network in real time, and accurately locates the session based on the packet length filter (session) traffic identification, and the introduction of the concept of a two-tuple composed of IP and port has completely changed the hysteresis of traffic identification.

[0019] In addition, since a typical P2P network is composed of many nodes, and each node is not only a server, but also a client, it not only uses TCP connection to download data, but also uses UDP distributed hash table information. Information data transmission.

[0020] The fol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for identifying a P2P application encryption flow, which comprises: firstly, acquiring messages communicated between nodes and a seed server according to data characteristics of an application layer, decoding the messages and acquiring binary information; secondly, decoding returned messages of a distributed network and acquiring binary information; thirdly, storing the binary information into a binary information table and simultaneously acquiring destination IP addresses and destination port numbers of all the flows; fourthly, matching the destination IP addresses and the destination port numbers with the binary information table, and labeling the destination IP addresses and the destination port numbers as corresponding P2P application if the destination IP addresses and the destination port numbers are matched with the binary information table; and fifthly, judging message length combination during data exchange according to specified message length combination, and identifying the message length combination as the P2P application encryption flow having the specified message length combination if the message length combination meets the specified message length combination. The method has the advantage of being capable of identifying the P2P application encryption flow and being accurate in identification.

Description

technical field [0001] The invention relates to a method for identifying encrypted flow in flow management, in particular to an identification method for the characteristics of bidirectional connection and dynamic port in P2P network, which flexibly utilizes the characteristics of node information exchange in the peer-to-peer protocol. Background technique [0002] The emergence of peer-to-peer network (Peer to Peer, P2P for short) technology makes the core of network applications spread from the central server to the edge of the network. At present, the encrypted traffic of peer-to-peer network applications represented by file sharing applications BitTorrent and eMule accounts for more than 50% of the bandwidth of operators, becoming the largest consumer of network bandwidth, which also hinders the development of normal network services and key applications popularity. [0003] P2P is a distributed network, in which each node is both a resource provider and a resource acqu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L12/56
Inventor 单衍景白司特
Owner 合肥昊特信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products