首页 | 本学科首页   官方微博 | 高级检索  
     

基于信令分析的BT流量预识别方法
引用本文:王志昊,冒九妹,李麟青,杨哲,李领治.基于信令分析的BT流量预识别方法[J].计算机与数字工程,2010,38(11):168-172.
作者姓名:王志昊  冒九妹  李麟青  杨哲  李领治
作者单位:[1]苏州大学计算机科学与技术学院,苏州215006 [2]江苏省计算机信息处理技术重点实验室,苏州215006
基金项目:江苏省自然科学基金,江苏省高校自然科学研究计划项目,国家级大学生创新性实验计划项目
摘    要:P2P(Peer-to-Peer)系统在内容共享、即时通信、流媒体等领域获得了广泛应用。然而,P2P流量消耗了大部分网络带宽,造成网络拥堵,实现对P2P流量的有效识别和管理成为了一个十分热门的话题。针对BT的信令协议,分析了从Tracker服务器、DHT网络及通过PEX协议,获取节点列表的过程,提出通过相应报文中节点列表的解析,来达到BT流量预识别的方法。该方法能准确预知BT数据流的发生,较准确地对BT流量进行识别,并且有效减少系统开销。

关 键 词:对等网络  信令分析  节点列表  流量预识别

BitTorrent Traffic Pre-Identification Based on Signaling Analysis
Wang Zhihao,Mao Jiumei,Li Linqing,Yang Zhe,Li Lingzhi.BitTorrent Traffic Pre-Identification Based on Signaling Analysis[J].Computer and Digital Engineering,2010,38(11):168-172.
Authors:Wang Zhihao  Mao Jiumei  Li Linqing  Yang Zhe  Li Lingzhi
Affiliation:),)(School of Computer Science and Technology,Soochow University1),Suzhou 215006)(Provincial Key Laboratory for Computer Information Processing Technology,Soochow University2),Suzhou 215006)
Abstract:Peer-to-peer(P2P) systems enable a wide range of important,scalable and reliable services such as file sharing,instant messaging(IM) and video streaming.However,excessive P2P traffic can cause significant network management problems because these systems are notoriously greedy with regard to bandwidth consumption.As a result,the effective monitoring and control of BT traffic has become a very hot topic.In this paper,the source of BT peer list is descibed,and then the methods of parsing packets which contain the peer list and pre-identification processing are analyzed.In all,this method realizes an accurate pre-identification of BT traffic which reduces system overhead effectively.
Keywords:peer-to-peer  signaling analysis  peer list  traffic pre-identification
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号