Peer-to-peer network traffic identification method of inseparable-wavelet support vector machine

A support vector machine and traffic identification technology, applied in the network field, can solve the problems of harming the security of interests, increasing the difficulty of P2P traffic, affecting the rights of users of non-P2P applications, etc., and achieving the effect of efficient identification

Inactive Publication Date: 2014-05-07
PUYANG VOCATIONAL & TECHN COLLEGE +6
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The rapid development of P2P technology has also brought many problems, which are reflected in the following aspects: (1) Occupying a large amount of network bandwidth: P2P applications such as sharing video and high-definition video occupy a large amount of network bandwidth and consume too much network resources , causing network congestion, and other normal network services cannot be carried out, which affects the rights of users of non-P2P applications and damages the interests of ISPs
(2) Network security protection issues: While the popularity of P2P applications, it also allows a large number of viruses, Trojan horse programs, and unhealthy content information to enter and spread rapidly on the Internet, giving hackers and lawbreakers opportunities to exploit. Harm the interests and safety of users
(3) Copyright issues of P2P file sharing: According to statistics, more than 80% of the content downloaded by P2P is suspected of piracy and infringement, which damages the interests of original authors. Issues such as piracy have intensified the intensity of key crackdowns
P2P traffic is different from traditional WEB traffic in that it is difficult to manage and control: (1) There is no fixed network protocol standard: P2P applications use its proprietary protocol, and ordinary firewall technology cannot completely filter P2P traffic ; (2) Dynamic ports are used: in order to avoid using fixed ports to detect P2P traffic, dynamic ports are adopted. Typical applications include PPlive and Skype. (3) Masquerading as normal traffic: When P2P applications such as Kazza transmit traffic, the packet format is disguised as HTTP traffic, which is even more difficult to identify
(4) Use traffic encryption technology: Skype, etc. use message encryption technology, so that the encrypted P2P traffic cannot be identified according to the method of application layer feature matching

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Peer-to-peer network traffic identification method of inseparable-wavelet support vector machine
  • Peer-to-peer network traffic identification method of inseparable-wavelet support vector machine
  • Peer-to-peer network traffic identification method of inseparable-wavelet support vector machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0050] An inseparable wavelet support vector machine peer-to-peer network traffic identification method, including:

[0051] 1. Select feature vector:

[0052] Selecting the appropriate feature vector is an important aspect of identifying P2P network traffic. When selecting features for P2P network traffic, two principles should be followed: (1) The traffic of nodes with different functions and providing different services shows differences. Therefore, choose the behavioral characteristics of node traffic as much as possible. (2) The selection of features should reflect the difference between P2P traffic and non-P2P traffic so as to shorten the training time and improve the accuracy of recognition. When there are enough feature vectors, it can provide a more accurate recognition rate for the classifier, but providing too many features will make the training time longer and increase the computational complexity. According to statistics, if in the algorithm based on machine learning...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a peer-to-peer (P2P) network traffic identification method of an inseparable-wavelet support vector machine. The method includes the following steps: (1): selecting feature vectors: adopting the following three-dimensional feature vectors: Vector=<v1, v2, v3>, wherein v1 represents a mean-square value of data packet size change, v2 represents the ratio of an uplink speed and a downlink speed at a node and v3 represents a ratio of the number of IP addresses and the number of ports; (2): selecting an appropriate kernel function; (3) selecting a increment training algorithm; (4) performing a Boosting algorithm for P2P traffic identification of wavelet SVM: at last, obtaining a strong classifier H(x) through adoption of a voting method with a weight for identification of the P2P traffic identification. The peer-to-peer network traffic identification method of the inseparable-wavelet support vector machine is capable of identifying the P2P network traffic efficiently and adopting a countermeasure timely to controlling effectively the P2P network traffic.

Description

Technical field [0001] The invention relates to a peer-to-peer network flow identification method of an inseparable wavelet support vector machine, which belongs to the technical field of computer peer-to-peer networks. Background technique [0002] Peer to Peer Computing (P2P) is developing at a rapid pace. P2P technology is a brand-new network communication mode. It has now been listed as one of the technologies that will affect the future development of Internet. Grid computing technology and cloud computing technology have become a related research focus in the field of distributed computing technology, which has attracted more and more attention from researchers. Currently, there is no precise definition for P2P technology, but its thinking has changed people's understanding and understanding of the Internet. The biggest difference between the P2P network and the traditional network is that it allows two users to link to each other, transfer and share files with each other,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/801H04L12/26H04L29/08
Inventor 汪绪彪王文彬王宏昕孙媛伍又云任艳梅
Owner PUYANG VOCATIONAL & TECHN COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products