Peer-to-peer network application traffic identification method

A technology of peer-to-peer network and identification method, which is applied in the direction of data exchange network, digital transmission system, electrical components, etc., and can solve the problems of voice, core business loss, enterprise threat, file sharing centralized controllability, manageability decline, etc. , to achieve the effect of solving network bandwidth congestion and improving accuracy

Inactive Publication Date: 2009-11-11
HUAZHONG NORMAL UNIV
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(2) Loss of voice and core services
(2) Intellectual property issues of the company: legitimate users can use the peer-to-peer network application software to spread the data of the company's internal network, which poses a serious threat to the company
(3) System security issues: There is no file storage center for peer-to-peer network application file sharing, which reduces the centralized controllability and manageability of file sharing. A large number of unauthorized and pirated files are spread and interacted among ordinary users, causing various viruses , network attacks, and malicious software spread among various clients to provide a hotbed, which has laid a huge hidden danger to the safe operation of the network
However, based on deep packet inspection technology, it also faces problems such as how to improve the performance of the detection algorithm, how to support the analysis of encrypted data, and how to update the peer-to-peer network application signature database, etc.
Similarly, although deep flow detection methods based on traffic characteristics have the advantages of high performance and good scalability, they also face many difficulties in practical applications due to poor accuracy.
In addition, the existing methods are mainly based on offline data analysis, lacking the real-time identification ability of peer-to-peer network application traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention is further explained and illustrated below.

[0023] A peer-to-peer network application traffic identification method, the identification method includes the following steps:

[0024] 1) Obtain the feature codes stored in the protocol header and protocol payload of the peer-to-peer network application tools from open source codes and online articles. Each feature code is used as a feature information of the peer-to-peer network application packet identification feature library, collected All the feature codes constitute the peer-to-peer network application packet identification feature library;

[0025]Different peer-to-peer network applications have their own interaction protocols, and the protocol headers and protocol loads of these interaction protocols carry some characteristic strings, for example: eDonkey2000 of the P2P protocol carries the strings of 0xe319010000 and 0xc53f010000, which the present invention calls 0xe319010000 and 0xc53f010...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a peer-to-peer network application traffic identification method and relates to the application of computer peer-to-peer network. The identification method is mainly applied in an open network environment. The invention adopts a traffic identification method combining deep packet scanning and deep stream scanning to identify the present increasing traffic of peer-to-peer network application, wherein deep stream detection is to mainly compare collected network traffic data with feature codes in a feature library so as to distinguish whether network traffic includes the traffic of peer-to-peer network application; and subsequently the deep stream detection distinguishes whether the network traffic includes the traffic of peer-to-peer network application based on the symmetry of the upstream and downstream traffic of the network traffic data and the linking number between peer nodes and other peer nodes. The identification method has the advantages of effectively expanding the identification range of traffic of peer-to-peer network application, boosting the accuracy rate of identifying the traffic of peer-to-peer network application and consequently guaranteeing the healthy, standardized and ordered development of peer-to-peer network application.

Description

technical field [0001] The present invention relates to the application of computer network, in particular to the application of computer peer-to-peer network, which belongs to the cross-technical application field of computer network, distributed computing and pattern recognition, and is mainly used to identify whether the network flow belongs to the peer-to-peer network application traffic. Background technique [0002] A peer-to-peer network (Peer-to-Peer, P2P for short) is a network structure idea in which there is no central node (or central server) in the entire network structure. It can make full use of the edge resources of the Internet, that is, the user's computing power, storage capacity and bandwidth, and even the contents of the computer hard disk. As a technology with more and more universal application value, the impact of peer-to-peer network on the future network communication characteristics will be immeasurable. Peer-to-peer network technology is widely u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/56H04L29/08
Inventor 胡征兵陈宏伟叶志伟
Owner HUAZHONG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products