Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication method avoiding p2p traffic identification

A communication method and traffic identification technology, which is applied in the field of network communication, to achieve the effect of reducing the probability of identification

Inactive Publication Date: 2016-04-20
北京广密华安科技有限公司
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, both VPN and SSL communication methods require additional channels to be established, and modules need to be set up separately for deployment
On the other hand, the two communication methods of VPN and SSL only camouflage the data content in the means of evading identification, and do not carry out targeted evasion from various aspects. For example, the two communication methods of VPN and SSL have some characteristics that are easy to be identified. or was misidentified as a characteristic of other intercepted communication protocols, resulting in blocking due to identification or misidentification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method avoiding p2p traffic identification
  • Communication method avoiding p2p traffic identification
  • Communication method avoiding p2p traffic identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0037] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0038] figure 1 It is a flowchart of a communication method for circumventing p2p traffic identification provided by an embodiment of the present invention.

[0039] Such as figure 1 As shown, in this embodiment, the communication method for avoiding p2p traffic identification provided by the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication method avoiding p2p traffic identification. The method comprises the following steps: S20: serializing information to be sent; S40: splitting the serialized information into a plurality of data packets with random lengths; S60: adding random data with preset lengths at the heads and / or tails of the data packets; and S80: sending the plurality of data packets in a random sequence through a dynamic network port. According to the communication method disclosed by the invention, the means of serializing the information to binary, splitting the data, randomly setting the lengths of the data packets, filling random data in important identification areas, sending the data packets in the random sequence and sending the data packets through the dynamic port and the like are integrated to effectively avoid the identification of the existing p2p traffic identification means and realize speed limitation or interception, and no single module needs to be set to establish an additional communication channel; such means as encrypting the data packets and adding random disturbing data packets and the like are further integrated to reduce the identification rate; and the instruction and the data are divided into double-channel communication to further reduce the identification rate.

Description

technical field [0001] The present application relates to the technical field of peer-to-peer network communication, in particular to a communication method for avoiding p2p traffic identification. Background technique [0002] After the emergence of p2p (Peer to Peer, peer-to-peer network, referred to as p2p) technology, the network grid computing mode has shifted from centralized to distributed, and the core of network applications has spread from central servers to edge devices. Due to the increase of p2p traffic on the current network, operators, enterprise users, and users in education and other industries all impose restrictions on such traffic, and at the same time set up, manage and control p2p traffic through firewalls and network management equipment. [0003] At present, the main equipment for identifying p2p traffic includes firewalls, routers, application gateways, and bypass statistics systems. The main means of identification are as follows: [0004] 1. Port...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/851H04L12/26
CPCH04L43/026H04L43/18H04L47/2483H04L67/104
Inventor 南野陈姝
Owner 北京广密华安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products