Method and system for detecting flow of peer-to-peer network

A traffic detection and peer-to-peer network technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as inability to accurately distinguish P2P application traffic, inability to achieve efficient and real-time detection, and complex machine learning implementations , to achieve the effect of improving concurrent processing capabilities, improving reliability and scalability, and good real-time performance

Inactive Publication Date: 2010-06-23
SUZHOU UNIV
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since this kind of aspect requires statistical analysis of a large number of data packets before making a judgment, the amount of data to be processed is large, and the implementation of machine learning is complicated, so efficient and real-time detection cannot be achieved
Moreover, the detection basis of this type of method is the traffic characteristics of P2P applications, which is a statistical quantity and cannot accurately distinguish various specific P2P application traffic.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting flow of peer-to-peer network
  • Method and system for detecting flow of peer-to-peer network
  • Method and system for detecting flow of peer-to-peer network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] A method and system for peer-to-peer network traffic detection, used for real-time, efficient and accurate detection of encrypted and unencrypted P2P application traffic.

[0040] figure 1 It is a flow chart of the peer-to-peer network traffic detection method in this embodiment, and is described in detail through specific steps below:

[0041] Step 101, the primary filtering device obtains data packets from the network forwarding device

[0042] For a network forwarding device with a fiber interface, the primary filter device can obtain the original data packet through optical fiber splitting on the network forwarding device. For the network forwarding device with port mirroring function, the primary filtering device can obtain the original data packet through the mirror port on the network forwarding device. For network forwarding devices that do not have optical fiber interfaces and port mirroring functions, a network tap or hub can be connected to the uplink (Up-L...

Embodiment 2

[0112] Figure 4 A network diagram of a peer-to-peer network traffic detection system provided in this embodiment includes a network 401, a network forwarding device A402, a primary filtering device 403, a server A404, a server B405, and a network forwarding device B406. in:

[0113] Network 401, that is, in Embodiment 1 image 3 The shown network 301 may be a network such as the Internet, a metropolitan area network, a campus network, or an enterprise network.

[0114] The network forwarding device A402 may be a router, a layer 3 switch, a layer 2 switch and other devices capable of forwarding data packets. The network forwarding device is only the data packet acquisition source of the primary filtering device.

[0115] The primary filtering device 403 is the embodiment 1 figure 2 The primary filter device 201 is shown.

[0116] The server A404 specifically implements the figure 2 The plaintext P2P traffic storage module, the ciphertext P2P traffic storage module and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for detecting a flow of a peer-to-peer network. The method comprises the following steps of: acquiring all the packets by a primary filter plant from a network forwarding device; detecting a plaintext feature string of a known P2P application after the primary filter is performed, sending a packet which contains a plaintext feature string to a plaintext processing model and counting a flow of the P2P forwarded in a plaintext manner; sending the packets which contain no plaintext feature string to a to-be-detected processing module and sending an active detecting packet formed by secret key information defined by different P2P applications to a detected target; detecting the flow of the P2P forwarded in a cipher text manner or other unknown flows according to a response packet fed back by the detected target. By implementing the technical scheme of the invention, processing work for flow detection is reduced effectively, the system efficiency is improved, and the failure and update of a single module do not influence the whole system. The technique of the invention avoids influencing the topology and performance of the traditional network and facilitates deployment and implementation.

Description

technical field [0001] The invention relates to the technical field of computer network traffic management, in particular to a method and system for detecting peer-to-peer network application traffic in computer network traffic. Background technique [0002] In recent years, various peer-to-peer (Peer-to-Peer, P2P) applications in computer networks have become more and more abundant, and many new application types and protocols have emerged. These P2P applications consume a large amount of network bandwidth, reducing the service quality of traditional Internet applications such as Web and Email, and the content transmitted by P2P applications also involves issues such as copyright, viruses and obscene content. Therefore, in order to effectively utilize network resources, protect intellectual property rights, and suppress the spread of viruses and obscene content, it is necessary to effectively manage the traffic of P2P applications, and first of all, it must be able to reali...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L12/26H04L29/08
Inventor 杨哲王志昊李麟青李领治朱艳琴纪其进
Owner SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products