Realization method of protocol identification and control system based on P2P (peer-to-peer network)

A control system and protocol identification technology, applied in the network field, can solve problems such as many human factors, and achieve the effect of improving identification efficiency, reducing processing pressure, and operating in good condition

Active Publication Date: 2012-07-11
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Research on the identification and control of P2P traffic has become a relatively popular topic at present. However, in recent years, the existing P2P traffic identification and control algorithms, mechanisms, and solutions still have various defects: the existing P2P traffic identification often requires Predict the specific information of the P2P protocol in advance, but the current P2P network new protocols emerge in endlessly, often change the transport layer port for communication, and even avoid detection through application layer encryption; the existing P2P flow control is also relatively lagging, and human factors are relatively There are too many, and it is impossible to allocate network bandwidth more intelligently, accurately and reasonably, so there is still a lot of room for improvement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realization method of protocol identification and control system based on P2P (peer-to-peer network)
  • Realization method of protocol identification and control system based on P2P (peer-to-peer network)
  • Realization method of protocol identification and control system based on P2P (peer-to-peer network)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Architecture

[0025] Non-encrypted message identification function: P2P traffic identification technology based on application layer data detection is to extract P2P application layer data (that is, P2P load) through protocol analysis and restoration technology, and judge whether it is It belongs to P2P application. Therefore, this type of method is also called Deep Packet Inspection (DPI). In the deep data packet detection technology, the feature library is established by extracting features from the specific P2P protocol and the load of the corresponding P2P system. For the real-time network flow passing through, the pattern matching algorithm is used to judge whether it contains the feature string in the feature library. If the feature matching is successful, the network flow is P2P data. The message identification part of the present invention uses DPI scanning technology to identify the hash search message and some related interactive messages in the specific n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims at providing a P2P flow identification and control system based on machine learning and a realization method of the system. The existing P2P flow is a burden of a network, the burden problem can be effectively controlled by identifying the P2P flow, so that the resource bandwidth pressure brought about by the P2P flow can be greatly reduced. Software in the invention has main functions of detecting and controlling the P2P flow, wherein a detecting system realized by an inner core module and a PTCM mechanism are core parts. A regular expression matching method is used for identifying unsecure flow, flow which can not be identified is classified by adopting an ensemble learning algorithm, and hash marking can be carried out on matched P2P flow, therefore, the purpose of combining a DPI mode and a TLI mode can be realized, the classified flow is then sent to the PICM mechanism for the generation of intelligent control strategies, and finally, a TC function module self-provided in a LINUX system is controlled by a message queue.

Description

technical field [0001] The invention is a protocol recognition and control system for peer-to-peer network services, which is mainly used to solve the problem of protocol recognition and control of peer-to-peer networks, and belongs to the field of peer-to-peer networks. Background technique [0002] In recent years, Peer-to-Peer applications have developed rapidly and occupied many application fields with lightning speed: File sharing applications represented by BitTorrent, Napster, and eMule rely on their free, equal, open resource sharing methods and The high-speed user download experience has quickly become the mainstream download tool. The voice communication software represented by Skype, ICQ, and MSN has made Internet telephony popular rapidly due to its smooth and clear call quality and low call charges, and has had a huge impact on the telecommunications business. Streaming media applications represented by PPlive, QQ Live, and PPstream, with their clear and smooth ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08
Inventor 王汝传赵丹孙力娟李致远韩志杰林巧民肖甫黄海平顾翔邵星
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products