Realization method of protocol identification and control system based on P2P (peer-to-peer network)

A control system and protocol identification technology, applied in the network field, can solve problems such as many human factors, and achieve the effect of improving identification efficiency, reducing processing pressure, and operating in good condition

Active Publication Date: 2012-07-11
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Research on the identification and control of P2P traffic has become a relatively popular topic at present. However, in recent years, the existing P2P traffic identification and control algorithms, mechanisms, and solutions still have various defects: the existing P2P traffic identification often requires Predict the specific information of the P2P protocol in advance, but the current P2P network ne

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realization method of protocol identification and control system based on P2P (peer-to-peer network)
  • Realization method of protocol identification and control system based on P2P (peer-to-peer network)
  • Realization method of protocol identification and control system based on P2P (peer-to-peer network)

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] Architecture

[0025] Unencrypted message identification function: P2P traffic identification technology based on application layer data detection uses protocol analysis and restoration technology to extract P2P application layer data (ie P2P payload), and judge whether it is by analyzing the protocol characteristic values ​​contained in the P2P payload Belongs to P2P applications. Therefore, this type of method is also called Deep Packet Inspection (DPI). In the deep packet inspection technology, feature extraction is performed on the specific P2P protocol and its corresponding P2P system load to establish a feature library. For the real-time network stream flowing through, the pattern matching algorithm is used to determine whether it contains the feature string in the feature library. If the feature matching is successful, the network stream is P2P data. The message identification part of the present invention adopts the DPI scanning technology to identify the hash s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims at providing a P2P flow identification and control system based on machine learning and a realization method of the system. The existing P2P flow is a burden of a network, the burden problem can be effectively controlled by identifying the P2P flow, so that the resource bandwidth pressure brought about by the P2P flow can be greatly reduced. Software in the invention has main functions of detecting and controlling the P2P flow, wherein a detecting system realized by an inner core module and a PTCM mechanism are core parts. A regular expression matching method is used for identifying unsecure flow, flow which can not be identified is classified by adopting an ensemble learning algorithm, and hash marking can be carried out on matched P2P flow, therefore, the purpose of combining a DPI mode and a TLI mode can be realized, the classified flow is then sent to the PICM mechanism for the generation of intelligent control strategies, and finally, a TC function module self-provided in a LINUX system is controlled by a message queue.

Description

technical field [0001] The invention is a protocol recognition and control system for peer-to-peer network services, which is mainly used to solve the problem of protocol recognition and control of peer-to-peer networks, and belongs to the field of peer-to-peer networks. Background technique [0002] In recent years, Peer-to-Peer applications have developed rapidly and occupied many application fields with lightning speed: File sharing applications represented by BitTorrent, Napster, and eMule rely on their free, equal, open resource sharing methods and The high-speed user download experience has quickly become the mainstream download tool. The voice communication software represented by Skype, ICQ, and MSN has made Internet telephony popular rapidly due to its smooth and clear call quality and low call charges, and has had a huge impact on the telecommunications business. Streaming media applications represented by PPlive, QQ Live, and PPstream, with their clear and smooth ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08
Inventor 王汝传赵丹孙力娟李致远韩志杰林巧民肖甫黄海平顾翔邵星
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products