期刊文献+

一种P2P流量监控系统的设计及实现 被引量:11

Design and Implementation of P2P Traffic Monitoring System
下载PDF
导出
摘要 当前P2P流量已经成为互联网流量的重要组成部分,针对互联网中存在大量的P2P业务流量影响了互联网关键业务的应用,设计了一种P2P流量监控系统。该系统采用分布式检测技术,通过网络抓包工具Analyzer分析的P2P业务流量特征,对P2P流量进行检测,并在网卡驱动NDIS层实现P2P流量控制。其监控策略由系统管理员制定,而策略的具体实施是在各个终端的网卡驱动层,通过实验验证了该方案的可行性。实验结果显示该系统检测精度高和扩展性强,易于在现有网络中部署实现。 The extensive use of P2P (Peer- to - Peer) network technology has a serious impact on the existing network. In this paper, design a P2P traffic monitoring system,which uses distributed detection technology, through network packet capture tool - Analyzer analysis the P2P services traffic character to detect P2P flow, and realized P2P traffic control in the network driver layer- NDIS. The control strategy developed by the system administrator and implemented by the various terminals in the network driver layer. Through experimental ensuring the system is feasibility, and the experimental result shows that the designed system having a good scalability and high detection, and it is easy realized in the existing network.
作者 徐鹤 王汝传
出处 《计算机技术与发展》 2009年第10期6-10,共5页 Computer Technology and Development
基金 国家自然科学基金(60573141 60773041) 江苏省自然科学基金(BK2008451) 国家高科技863项目(2007AA01Z404 2007AA01Z478) 南京市高科技项目(2007软资127) 现代通信国家重点实验室基金(9140C1105040805) 江苏省博士后基金(0801019C) 江苏高校科技创新计划项目(CX08B-085Z CX08B-086Z)
关键词 P2P 流量检测 流量控制 控制策略 Peer - to - Peer traffic detection traffic control control strategy
  • 相关文献

参考文献10

  • 1吴国庆.对等网络技术研究[J].计算机技术与发展,2008,18(7):100-103. 被引量:28
  • 2蒋海明,张剑英,王青青,彭娟.P2P流量检测与分析[J].计算机技术与发展,2008,18(7):74-76. 被引量:25
  • 3郭兴阳,高峰,唐朝京.一种NDIS中间层数据包过滤方法[J].计算机工程,2004,30(17):102-103. 被引量:14
  • 4Bittorrent[ EB/OL]. 2008. http://www, bitoomet. com. 被引量:1
  • 5EDonkey[ EB/OL]. 2008. http.//www, edonkey2000, cn. 被引量:1
  • 6PPLive[ EB/OL]. 2008. http://www, pplive, com. 被引量:1
  • 7Cheng W Q, Gong J,Ding W. Identifying BT- like P2P Traffic by the Discreteness of Remote Hosts[C]//32nd IEEE Conference on Local Computer Networks. Washington, USA: IEEE Computer Society,2007 : 237 - 238. 被引量:1
  • 8Zhang Qi, Piumatti M, Singhal S K. Private Peer - to - Peer Overlay for Real- Time Monitoring of a Deployed Internet- Scale Peer- to- Peer Overlay[ C] //Seventh lEEK International Conference on Peer - to - Peer Computing. Galway, Ireland: IEEE Computer Society, 2007 : 235 - 236. 被引量:1
  • 9Schollmeier R, Dr. Sehollmeier I G. Why Peer- to- Peer (P2P) Does Scale:An Analysis of P2P Traffic Patterns[C]// Proceedings of the Second International Conference on Peer- to - Peer Computing (P2P' 02 ). Link6ping, Sweden: IEEE Press,2002 : 112 - 119. 被引量:1
  • 10Guo Lei, Chen Songqiilg, Zhen Xiao, A Performance Study of BitTorrent- like Peer - to- Peer Systems[ J ]. IEEE Journal on Selected Areas in Communications, 2007,25 ( 1 ) : 155 - 169. 被引量:1

二级参考文献41

  • 1[1]Microsoft Windows 2000 Driver Development Kit Documentation. 被引量:1
  • 2[2]http://www.driverdevelop.com. 被引量:1
  • 3[3]Ndis Intermediate Driver Questions. http://www.pcausa.com/resourses /Ndisim faq.htm. 被引量:1
  • 4[4]RFC 2401 :Seeurity Architecture for the Internet Protocol. 被引量:1
  • 5刘德刚,周刚,向金海.基于Napster架构的P2P空间数据共享研究[J].微计算机信息,2007,23(27):219-220. 被引量:5
  • 6程学旗 余智华 陆天波.P2P技术与信息安全[J].信息技术快报,2004,(3). 被引量:6
  • 7CacheLogic[ EB/OL]. 2006. http://www. cachelogic. com/. 被引量:1
  • 8BitTorrent[EB/OL]. 2007. http://www. bittorrent. com/. 被引量:1
  • 9Karagiann I T, Broidoa, Faloutsosm. Transport Layer Iden- tification of P2P Traffic[ C]//Proceedings of the 4th ACM SIGOOMM Conference on Internet Measurement. New York: ACM Press, 2004:121 - 134. 被引量:1
  • 10Sen S, Wang Jia. Analyzing Peer - to - Peer Traffic across Large Networks[ C] // In: IEEE/ACM Transactions on Net- working. NJ:IEEE Press, 2004:219-232. 被引量:1

共引文献58

同被引文献32

引证文献11

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部