Dissertation > Excellent graduate degree dissertation topics show

Research of P2P Traffic Identification Based on DPI

Author: YouFangPing
Tutor: ChenHongWei
School: Hubei University of Technology
Course: Applied Computer Technology
Keywords: P2P matching algorithm sampling method trust mechanism
CLC: TP393.06
Type: Master's thesis
Year: 2010
Downloads: 77
Quote: 0
Read: Download Dissertation

Abstract


With the rapid development of P2P (peer-to-peer) network applications technology, it becomes a heavyweight of Internet applications. In one side, it brings convenience to Internet users, but in the other side, it also seizes the majority of the network bandwidth for a long time and devours a large number of network resources. It makes the network congestion and increases the burden on the network. Eventually, it weakens the ability of network applications for all users. Therefore, the efficient and rational control for P2P network is an important method to improve the network environment. Among them, the identification of P2P network data is a prerequisite for the control. This paper aims at finding out ways to improve the efficiency of DPI testing.In order to detect and control the P2P traffic efficiently, the DPI deep packet scanning technology is studied deeply and more detailed study spend on the current popular string matching algorithm for multi-mode:AC (Aho-Corasick) algorithm, Wu-Manber algorithm and SBOM algorithm in this paper. It analyses the principle of the three algorithms. Three algorithms are used in DPI scanning under the same testing environment and the pretreatment time, analysis speed, degree of accuracy from this testing were compared. Based on these experimental data, the superiority-inferiority of these three algorithms in different conditions is discussed and their relative scopes of application are summarized. But DPI identification technology is difficult to apply in high-speed networks due to its slow execution speed. To solve this problem, this paper suggests six sampling strategies:invariable random sampling, invariable mechanical sampling, time random sampling, time mechanical sampling, speed random sampling mode and speed mechanical sampling. Discussing and testing how these strategies affect the DPI identification system in different network environments. Test conclusions shows that six sampling modes reduce the burden on the system in different degrees and maintain a high identification ratio of P2P data stream. Then trust mechanism based on sampling method is proposed to reduce the burden on the hardware and network latency, so that less loss and higher efficiency operation are premised on the accuracy the DPI. We achieve these following results:1. The comparative study of three algorithms AC (Aho-Corasick), Wu-Manber and SBOM was accomplished. The superiority-inferiority of these three algorithms in different conditions is discussed and their relative scopes of application are summarized.2. Slicing mechanism sampling method is designed to explore the mathematical theory of this method and the software design process. 3. This article achieved the sampling method based on slicing mechanism and on this basis fully proved the feasibility and effectiveness of sampling methods by a large number of actual data testing. It concluded that the different methods demonstrate differences in different network environment.4. The new DPI sampling method based on trust mechanism is proposed. it is a further derivative of slicing sampling methods. In theory, new types of sampling methods is described in detail, including how to build a new sampling method steps, how to achieve the trust mechanism, how to set up the trust rules and how to design change rules of sampling ratio of. This design has the nature of innovation and invention.

Related Dissertations

  1. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  2. Research on Peer-to-Peer Traffic Identification Algorithm Based on Cluster Analysis,TP393.02
  3. The Design and Implementation of the Live Server in Audio and Video Broadcast Distance Education System,TP311.52
  4. Design and Implementation of P2P streaming system,TN919.8
  5. Virus Detection Technology Based on Artificial Immune,TP393.08
  6. The Research on Distributed Self-Organized Network Based Wide Area Backup Protection,TM774
  7. Research and Realization of Organizational Mechanisms for the Virtual Terminal Systems in Ubiquitous Environment,TN915.02
  8. An Optimized Transmission Algorithm Based on Network Coding in Wireless Network,TN911.22
  9. P4P-based System for Streaming Media On-demand Research and Implementation,TN948.64
  10. Research on Fast Indexing Mechanism of P2P Based Spatial Vector Data,TP391.3
  11. Design and Implement of C/S Instant Message System Based on Winsock,TN914
  12. The Research of Trust Model and Related Technologies in P2P Networks,TP393.08
  13. P2P streaming feature extraction technology research and implementation,TN919.8
  14. High flow conditions P2P streaming real-time behavior recognition system design and implementation,TN919.8
  15. Windows Kernel Rootkit Detection Technology Research,TP309
  16. One based on UDP P2P instant communication software design and implementation,TP393.02
  17. One kind of P2P live under IPV4/IPV6 hybrid network system resource sharing method,TP393.02
  18. An Analysis and Measurement of Video Surveillance System Called Mobiling Global Eyes Over P2P,TN929.5
  19. CDN and P2P technologies based on a mixture of streaming media content distribution mechanism,TN919.8
  20. SURF algorithm based on multiple images of three-dimensional model reconstruction method,TP391.41
  21. STB -oriented P2P streaming audio playback System,TN948.55

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer networks, test , run
© 2012 www.DissertationTopic.Net  Mobile