Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and system for flow identification of point to point (P2P) protocol

A traffic identification and protocol technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve the problems of server address and port changes, which are not very effective, and achieve the effect of good scalability

Active Publication Date: 2011-03-09
TSINGHUA UNIV
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, the most commonly used method is to block Thunder's server address and service port, but its server address and port are changing, so this method is not very effective

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for flow identification of point to point (P2P) protocol
  • Method and system for flow identification of point to point (P2P) protocol
  • Method and system for flow identification of point to point (P2P) protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The P2P protocol traffic identification method and system proposed in the present invention will be described in detail in conjunction with the accompanying drawings and embodiments.

[0046]The present invention summarizes the structure of the P2P protocol based on a large number of observations on the P2P protocol and traffic, and innovatively adopts the heuristic message clustering technology to analyze the P2P protocol traffic, and obtains the working status of the P2P protocol The key interaction process state machine and the key commands in it, with the support of the key commands and the key interaction process state machine, can identify and classify the P2P protocol traffic in the traffic in real time. According to the P2P protocol traffic identification method of an embodiment of the present invention, especially the identification of Thunder traffic, the heuristic conditions for Thunder's message reorganization include:

[0047] (1) Xunlei header is not encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for identifying point to point (P2P) protocol flow. The method comprises the following steps: S1, analyzing the initial handshake interactive process of P2P protocol flow to obtain a state transfer set representing a selected interactive process, wherein the state transfer set comprises key commands in the state transfer process; S2, dividing the flowto be identified to multiple streams according to a quintuple; S3, judging whether the streams to be identified can be subjected to P2P protocol message reorganization or not in accordance with the heuristic condition set of the P2P protocol message reorganization; S4,checking whether messages of the streams to be identified contain the key commands or not; and S5, judging whether the message constitution of the streams to be identified conform to items in the state transfer set of the interactive process. The method and the system of the invention can improve the effectiveness and speed of P2P flow identification and have strong expandability.

Description

technical field [0001] The invention relates to the technical field of information security and monitoring, in particular to a P2P protocol traffic identification method and system. Background technique [0002] Network flow classification and protocol identification technology is the core technology in the field of information security and monitoring. Its main task is to identify the network protocol category to which the flow belongs based on the information contained in the network flow and the packets in the flow. [0003] From 2006 to 2009, global peer-to-peer (Peer-to-Peer, P2P) traffic accounted for more than half of the total Internet bandwidth. Xunlei is the most popular P2P file transfer software in China, with more than 329 million registered users and more than 166 million monthly active users. In addition to providing fast end-to-server and end-based user-to-server and user mechanism (Peer to Server & Peer, P2SP) file transfer services, Xunlei also supports bo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L12/56H04L12/801
Inventor 李城龙薛一波
Owner TSINGHUA UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More