{"title":"P2P识别技术的研究","authors":"Haojian Ma, Shunhua Tan, Zhenfeng He","doi":"10.1109/ICSESS.2014.6933640","DOIUrl":null,"url":null,"abstract":"In recent years, with the growth of P2P software, the operation mechanism has been much diversified. It is very difficult to classify P2P flow and normal flow based on single testing method. The increasing number of encrypted P2P protocols posed big challenge to testing. This thesis analyzes the identifying method for P2P flow based on port number, payload signature inspection, reverse connection ratio, convection analysis. Finally, these four analysis method is in comparison.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"162 1","pages":"601-604"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"The research of P2P recognition technology\",\"authors\":\"Haojian Ma, Shunhua Tan, Zhenfeng He\",\"doi\":\"10.1109/ICSESS.2014.6933640\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, with the growth of P2P software, the operation mechanism has been much diversified. It is very difficult to classify P2P flow and normal flow based on single testing method. The increasing number of encrypted P2P protocols posed big challenge to testing. This thesis analyzes the identifying method for P2P flow based on port number, payload signature inspection, reverse connection ratio, convection analysis. Finally, these four analysis method is in comparison.\",\"PeriodicalId\":6473,\"journal\":{\"name\":\"2014 IEEE 5th International Conference on Software Engineering and Service Science\",\"volume\":\"162 1\",\"pages\":\"601-604\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-06-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 5th International Conference on Software Engineering and Service Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSESS.2014.6933640\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 5th International Conference on Software Engineering and Service Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS.2014.6933640","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In recent years, with the growth of P2P software, the operation mechanism has been much diversified. It is very difficult to classify P2P flow and normal flow based on single testing method. The increasing number of encrypted P2P protocols posed big challenge to testing. This thesis analyzes the identifying method for P2P flow based on port number, payload signature inspection, reverse connection ratio, convection analysis. Finally, these four analysis method is in comparison.