CN101599897A - A kind of peer-to-peer network flow control methods that detects based on application layer - Google Patents

A kind of peer-to-peer network flow control methods that detects based on application layer Download PDF

Info

Publication number
CN101599897A
CN101599897A CNA2009100332307A CN200910033230A CN101599897A CN 101599897 A CN101599897 A CN 101599897A CN A2009100332307 A CNA2009100332307 A CN A2009100332307A CN 200910033230 A CN200910033230 A CN 200910033230A CN 101599897 A CN101599897 A CN 101599897A
Authority
CN
China
Prior art keywords
packet
main frame
router
port
htb
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2009100332307A
Other languages
Chinese (zh)
Other versions
CN101599897B (en
Inventor
王汝传
宫博
吴敏
韩志杰
李玲娟
支萌萌
徐小龙
饶元
李致远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN2009100332307A priority Critical patent/CN101599897B/en
Publication of CN101599897A publication Critical patent/CN101599897A/en
Application granted granted Critical
Publication of CN101599897B publication Critical patent/CN101599897B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The peer-to-peer network flow control methods that detects based on application layer is divided into two modules and is deployed in respectively on main frame and the router, main frame is discerned the P2P data when application call socket layer DLL (dynamic link library), and the P2P packet tagged, router is done corresponding analyzing and processing after receiving packet, and according to control law the P2P data is handled.Form by the main frame recognition methods of analyzing based on fileinfo with based on layering token bucket (HTB) flow control methods of Linux router based on the P2P flow control methods that application layer detects, the present invention compares scheme in the past, improved recognition accuracy significantly, improve the problem of autgmentability difference, had the advantage real-time, that lower deployment cost is low.

Description

A kind of peer-to-peer network flow control methods that detects based on application layer
Technical field
The present invention is a kind of flow identification and the method for controlling at specific network service.Be mainly used to solve peer-to-peer network (P2P) and use, improve the network congestion situation of bringing thus, belong to identification of P2P flow and control field the Internet resources contention.
Background technology
The flow of P2P network has following characteristics:
Uncertain
Because the diversity that P2P uses causes its network traffics not only on traffic characteristic, and also shows uncertainty on the behavior feature.In addition, the dynamic of P2P network node has also increased the uncertainty of peer-to-peer network flow.
Magnanimity
The P2P network size is bigger, has brought performance issue for the real-time detection of flow.
Encryption
Because the P2P network belongs to application layer, therefore in order to hide content monitoring, existing P2P system has all carried out encryption to its load.
More existing detection techniques, can be divided into based on traffic characteristic recognition methods (TLI) and based on deep layer packet identifying method (DPI) two classes:
(1) basic thought based on the P2P flow rate testing methods of traffic characteristic is: by transport layer data bag (comprising TCP and UDP message bag) is analyzed, and in conjunction with the traffic characteristic that the P2P system is showed, discern certain network flow and whether belong to P2P.But this class technology is many, but ubiquity is difficult to the shortcoming of practical application: because P2P adopts the random port technology more, so there is the serious problem of failing to report in the TCP/UDP port identification technology; The calculating of network diameter need be write down the connection status of whole network, and therefore not only storage and computing cost are big, nor supports the Real time identification and the filtration of P2P flow; Angle of rotation of joint colour analysis technology also needs to write down the connection status of whole network, therefore faces problems such as storing big with computing cost, as can't to supply P2P flow Real time identification and filtering function equally; Because name server application such as (DNS) also can be used Transmission Control Protocol and udp protocol simultaneously, so there is serious wrong report problem in agreement to analytical technology; Address port still lacks the ability of Real time identification and filtration to having the high advantage of performance.
(2) the P2P flow recognition technology that detects based on application layer data is by protocal analysis and reduction technique, by the load of concrete P2P agreement and corresponding P2P system thereof is carried out feature extraction, sets up feature database.Real-time network stream for flowing through adopts pattern matching algorithm, judges the feature string that wherein whether comprises in the feature database.If the characteristic matching success, this network flow is exactly the P2P data.This method has hysteresis quality to the flow identification that new P2P uses, and promptly can't not detect new P2P application before the upgrade feature storehouse, and P2P software modification encipherment scheme will cause old feature database to lose efficacy.So there is poor expandability in this scheme, lacks problems such as analyzing the enciphered data function.
Summary of the invention
Technical problem: main purpose of the present invention is: a kind of peer-to-peer network flow control methods that detects based on application layer is provided, the present invention compares scheme in the past, improve recognition accuracy significantly, improved the problem of autgmentability difference, had the advantage real-time, that lower deployment cost is low.
Technical scheme: the present invention is divided into two modules and is deployed in respectively on main frame and the router, main frame is discerned the P2P data when application call socket layer DLL (dynamic link library), and the P2P packet tagged, router is done corresponding analyzing and processing after receiving packet, and according to control law the P2P data is handled.
Form by the main frame recognition methods of analyzing based on fileinfo with based on layering token bucket (HTB) flow control methods of Linux router based on the P2P flow control methods that application layer detects, wherein, the main frame recognition methods performing step based on the fileinfo analysis is:
Step 1). write self-defined sockets services interface (Windows Sockets SPI) framework, replace the SPI chained library of acquiescence,
Step 2). analyze the fileinfo of present main flow P2P software, add their source filename to the identification storehouse,
Step 3). main frame identification software and identification storehouse are published on interior each main frame of net,
Step 4). when main frame networks, send the P2P packet and be coupled with mark,
Step 5). according to the new P2P software upgrading identification storehouse that occurs, and be published to main frame,
Step 6). if main frame is not installed main frame identification plug-in unit, then can't surf the Net, and be automatically brought to step 3) when it networks;
HTB flow control methods performing step based on the Linux router is:
Step 21). router is installed flow-control module, the parameter of configuration HTB formation,
Step 22). receiving the packet that main frame is sent, check service priority (TOS) field, is that zero an explanation main frame is not installed P2P identification plug-in unit, with data packet discarding,
Step 23). according to the source/destination address classification of packet,
Step 24). source/destination address all belongs to the packet of Intranet, sends into corresponding HTB formation according to the TOS field,
Step 25). mail to the P2P packet of outer net for Intranet, extract its source address/port, inquiry P2P port mapping table if do not find, is then done it is inserted for new list item, then this packet is sent into the HTB formation; Through the packet after protocol address conversion (NAT) conversion, if Intranet mails to outer net, then it is carried out reverse protocol address conversion (De-SNAT) operation, obtain source address/port, inquire about the P2P port mapping table with this then, find corresponding list item after, with the source address/port of this packet, fill out router address/peer-port field respectively
Step 26). mail to the packet of Intranet for outer net, take out its destination address/port and inquire about the P2P port mapping table, can know that whether this packet is the P2P packet, sends into it HTB formation then.
Beneficial effect: the present invention proposes a kind of method of the P2P of control flow, method in the past has some significant advantages relatively:
(1) recognition accuracy reaches 100%, has eliminated erroneous judgement.The version information of software generates when program compilation, domestic consumer can't revise, to the source filename in version information identification, can not occur failing to judge, situation such as erroneous judgement, and traditional on router, carry out identification mode and generally only can reach 90%~95% identification hit rate.
(2) realize to take different flow control strategies at different P2P software to the segmentation of P2P management.Such as QQ, chat tools such as MSN also are based on the P2P technology, and they can't cause the bandwidth anxiety, but according to some traditional control methods, what have can't distinguish this class software, and what have promptly enables to accomplish also to exist the erroneous judgement problem.
(3) autgmentability is strong.Therefore do not need to carry out the protocal analysis of packet, do not need to follow the P2P software protocol and upgrade the identification storehouse, variable multi-protocols P2P software also can be realized control during to operation.Since do not need the agreement deciphering, also very low to network manager's requirement, only needing the new identification storehouse of emerging P2P software issue is got final product, method in the past greatly reduces management cost relatively.
(4) control fully in real time also can realize control to variable port P2P software, and recognition efficiency is high.The present invention just can identify when P2P software sends first packet, eliminates the interest for delinquency of conventional method, to the variation all-the-way tracking of main frame P2P port.Relative conventional method, the present invention is distributed to each main frame with identifying operation and carries out, and router is only realized control strategy, has alleviated the pressure of router, only the P2P data is carried out associative operation, and to the transmission not influence fully of non-P2P data, efficient improves greatly.
Description of drawings
Fig. 1 is the structural representation of main frame identification module.
Fig. 2 is the flow chart of main frame identification module.
Fig. 3 and Fig. 4 are the specific strategies of classification queue.
Fig. 5 is the schematic diagram of router flow-control module, and wherein three kinds of arrows are represented the handling process of three class different pieces of information bags, and need accessed resources in the processing procedure.1. locate to PREROUTING intercept point among the figure, 2. locate intercept point among the figure into POSTROUTING.
Embodiment
Architecture
Self-defined Winsock 2SPI framework
Windows Sockets 2.0 versions provide SPI DLL (dynamic link library), and this interface can insert one deck in Socket, thereby realize transmission quality control (QOS), functions such as expansion ICP/IP protocol stack.Winsock is a kind of standard network interface that provides for upper level applications.Upper level applications is indifferent to it and is realized details, and it only provides transparent service for upper level applications.The SPI DLL (dynamic link library) that Winsock2.0 introduces is exactly break the ISP transparent, allows the exploitation personnel can write the ISP's interface routine of oneself.SPI exists with the form of dynamic link library, is operated in application layer, for the upper strata API Calls provides interface function.
The SPI program that the present invention writes oneself is installed in the system, and all Winsock requests all can send to this program, and finish P2P identification and markers work by it.The SPI that system provides can finish transfer function, so in this module, just they are stashed, after identifying finishes, calls them again and finishes Network Transmission.
The formation of Linux router HTB Bandwidth Management
The bandwidth management capability that the present invention adopts Linux to provide carries out the P2P flow control.Linux system provides multiple queue management mechanism, and what the present invention used is the HTB formation.HTB (Hierarchical Token Bucket, the token bucket of layering) is a kind of classification queue, and it is complicated more not have Class Queue relatively, but can utilize grader to realize data packet dispatching, thereby makes non-P2P packet have precedence over the P2P data packet transmission.It is fairly simple that other classification queue configurations are compared in the HTB formation in addition, and support bandwidth division and bandwidth to use function.
The packet classification label model
The function of this module is to divide three classes to do different disposal the packet that router is received: [Intranet] end<----〉end [Intranet], [Intranet] end<----〉end [outer net], [outer net] end<----〉end [Intranet].Netfilter subsystem in the Linux core provides five intercept points, is respectively PREROUTING, INPUT, FORWARD, POSTROUTING and OUTPUT.The present invention intercepts and captures the packet that has just arrived router at the PREROUTING point, extracts its source destination address and is classified.
The P2P-NAT port mapping table
Router product provides NAT mechanism (Network address and port translators) to solve the problem of protocol address deficiency.NAT and fire compartment wall will abandon the packet that is initiatively sent to Intranet by outer net, guarantee to connect internally and initiate, and promptly go out laggard earlier.The main frame that is positioned at certain NAT back can be dropped to the packet of the main frame transmission of another NAT back, and P2P software utilizes the NAT through-transmission technique to solve this problem.The NAT through-transmission technique is meant, if host A is want the host B behind another NAT and is sent packet, host A at first needs the server S on public network to initiate to connect so, protocol address ia and port pa after by server S host A being changed through NAT then send to host B, host B just can send packet to ia/pa like this, but this packet can be abandoned by the router of host A, yet at this time, the unidirectional route of host A → host B is set up, as long as protocol address ib and port pb server S is changed host B through NAT after send to host A, host A just can send data to ib/pb (being host B).Same mode is set up the route of host B → A main frame, and then two main frames are finished NAT and penetrated, and can send data mutually.
According to the principle of NAT through-transmission technique, P2P software and outer net main-machine communication must be set up earlier port mapping on router.The present invention utilizes these characteristics of P2P software, self-defined P2P port mapping table is used to write down the port of router transmission P2P data, and the list item of this table comprises the IP address and the port numbers of router, the handled P2P COS of this port, and corresponding with it host ip and port.
Method flow
The present invention is discerned the packet that P2P initiates connection request by main frame, by the tag along sort resume module on the router, utilizes the HTB formation of disposing on the router to carry out flow control.Idiographic flow is as follows:
(1) P2P identification and mark
When application program loads the SPI dynamic link library, the process name of the program that can be applied, and inquire about the version information (FileVersionInfo) of this application program according to process name, take out its source filename, source filename can't be by user's modification, and generally can not change along with software release upgrade, at this moment can discern according to the source filename of process, if P2P software, add mark then for this process, when having process transfer SPI to send data, only need to check this mark, can judge whether data into P2P.But do the clearance that can only realize packet like this and abandon two kinds of operations, and can't realize flow control.Router can provide perfect flow control strategy, is P2P so must notify which data of router.The SPI of Winsock 2.0 provides raw socket function (Raw Socket), can directly control various protocols under the Windows by it, and can control the transmission mechanism of network bottom layer.The present invention utilizes this function, passes through the layering of operating system network protocol stack, directly is provided with at the IP head of application layer to packet.The present invention uses the TOS field in the IP head that the P2P packet is identified.Like this, when router received packet, the TOS field that only needs to check packet got final product.
(2) packet classification
When router is received packet, promptly extract its source/destination address, carry out different processing after classifying.
Two ends are Intranet P2P packet, and processing procedure is very simple.Only need judge whether it is the P2P data according to the TOS field, if P2P data, so this it just belong to [Intranet] end<----end [Intranet] type P2P packet, the P2P software type that can directly be reflected according to the TOS field adds corresponding HTB formation with it.
Hold----for [Intranet]〉end [outer net] type P2P packet, at first extract its source address and port numbers, inquire about above-mentioned P2P port mapping table with this, if do not find, then do it is inserted for new list item, at this moment, two fields of router IP/ port of this list item temporarily are empty, then this packet are sent into the HTB formation.Packet after the analysis of the POSTROUTING of NAT chain intercept point is through the NAT conversion, if [Intranet] end----〉end [outer net] type P2P packet, then it is carried out the De-SNAT operation, obtain source IP/ port, inquire about the P2P port mapping table with this then, after finding corresponding list item,, fill out router port/IP field respectively with the source IP/ port of this packet.
Hold----for [outer net]〉end [Intranet] type packet, take out its purpose IP/ port and inquire about the P2P port mapping table, can know that whether this packet is the P2P packet, sends into it HTB formation then.
(3) HTB formation
Classified data packages is admitted to different HTB classes, and concrete classification policy of the present invention is as follows:
Classid?1:10
This is the class of highest priority.Packet in this class has minimum delay and obtains idle bandwidth at first, and the peak rate of this class need be set.Require the low service that postpones to belong in such: ssh, telnet, dns, quake3, irc and have the packet of SYN mark.
Classid?1:11
This is the class that is used to place transmission in enormous quantities.Comprise such as: be used for handling from this locality to the WEB server and send packet with browsing page, relevant and other the non-P2P packets of mail (SMTP, pop3).
Classid?1:12
Comprise the less P2P packet of some flows in this class, such as QQ, P2P chat tools such as MSN.
Classid?1:13
Comprise the packet that the bigger P2P software of data traffic produces in this class, such as file-sharing class software.
By the attribute of above-mentioned four classification is set, thresholding speed rate uses bandwidth limit ceil, and priority prio can implement control to the P2P data traffic.Even not having other data in the link passes through, P2P can not use all bandwidth, because the operations such as visit of web are belonged to the burst behavior, if there is not remaining bandwidth this moment, then can cause access delay, so the maximum bandwidth ceil that will can use for the setting of P2P data; In addition, non-P2P packet is than P2P priority of data packets height.
Describe for convenient, suppose following network environment: host A, B are by router R visit Internet, and router R has loaded flow-control module, and host B has been installed P2P identification plug-in unit; Host C is by router R ' visit Internet, and three main frames all use Emule (P2P file-sharing class software) to download certain file, and the Emule server is S.Embodiment is as follows:
(1) host A is opened Emule, and initiates the request of landing to server S.
(2) P2P identification plug-in unit is not installed, the packet header TOS field of the packet that host A sends is zero, is routed device R and abandons, and lands failure, and this moment, host A can't connect Internet.
(3) host A is installed P2P identification plug-in unit.
(4) host A reopens Emule, and the Emule process is written into self-defined Winsock SPI framework.
(5) host A sends the request of landing to server S, and data packet head by reconstruct, obtains new TOS value before host A sends, and when arriving router R, R finds the P2P data according to the TOS value.
(6) R writes down the source IP/ port of this packet, and promptly host A is used for the IP/ port (Ia/Pa) with server S communication, and it is added the P2P-NAT port mapping table, is Classid 1:13 class then with packet marking and sends into the HTB formation.
(7) the tag along sort module on the R, extract through the IP/ port (Ira/Pra) after the NAT conversion, it is carried out the De-SNAT operation, obtain (Ia/Pa), in port mapping table, find the list item that added just now, to insert router IP/ peer-port field through the IP/ port after the NAT conversion, a complete mapping item is set up.
(8) server S sends to host C with (Ia/Pa), and (Ic/Pc) after C is changed through router R ' NAT sends to host A.A sends packet to (Ic/Pc), and C sends packet to (Ia/Pa), finishes NAT and penetrates.
(9) when router R received host C to packet that (Ia/Pa) sends, inquiry P2P-NAT port mapping table found that it is the P2P data, so be Classid 1:13 class with packet marking and send into the HTB formation.So far, host A all is in slave mode with respect to the up-downgoing flow of the host C under other routers.
(10) host B has been installed main frame identification plug-in unit, so host B is identical with (4)~(7) of host A when starting Emule.But it and host A belong to same Intranet, do not penetrate operation so do not need to carry out NAT.
(11) the Emule software of host A directly sends data to the IP of host B address, when data arrive router R, R finds that according to the TOS value it is P2P, it is labeled as Classid 1:13 class and sends into the HTB formation, and the uplink traffic of host A and the downlink traffic of host B are in slave mode at this moment.Directly when the IP of host A address sent data, in like manner, the uplink traffic of host B and the downlink traffic of host A were in slave mode to the Emule software of host B.
(12) the two-way P2P flow between the main frame of host A and Intranet and outer net is all controlled.

Claims (1)

1. peer-to-peer network flow control methods that detects based on application layer, it is characterized in that this method is by forming based on the main frame recognition methods of fileinfo analysis with based on the layering token bucket HTB flow control methods of Linux router, wherein, the main frame recognition methods performing step based on the fileinfo analysis is:
Step 1). write self-defined sockets services interface Windows Sockets SPI framework, replace the SPI chained library of acquiescence,
Step 2). analyze the fileinfo of present main flow P2P software, add their source filename to the identification storehouse,
Step 3). main frame identification software and identification storehouse are published on interior each main frame of net,
Step 4). when main frame networks, send the P2P packet and be coupled with mark,
Step 5). according to the new P2P software upgrading identification storehouse that occurs, and be published to main frame,
Step 6). if main frame is not installed main frame identification plug-in unit, then can't surf the Net, and be automatically brought to step 3) when it networks;
HTB flow control methods performing step based on the Linux router is:
Step 21). router is installed flow-control module, the parameter of configuration HTB formation,
Step 22). receiving the packet that main frame is sent, check service priority TOS field, is not peace of zero an explanation main frame
Dress P2P identification plug-in unit, with data packet discarding,
Step 23). according to the source/destination address classification of packet,
Step 24). source/destination address all belongs to the packet of Intranet, sends into corresponding HTB formation according to the TOS field,
Step 25). mail to the P2P packet of outer net for Intranet, extract its source address/port, inquiry P2P port mapping table if do not find, is then done it is inserted for new list item, then this packet is sent into the HTB formation; Through the packet after the protocol address conversion NAT conversion, if Intranet mails to outer net, then it is carried out reverse protocol address conversion De-SNAT operation, obtain source address/port, inquire about the P2P port mapping table with this then, find corresponding list item after, with the source address/port of this packet, fill out router address/peer-port field respectively
Step 26). mail to the packet of Intranet for outer net, take out its destination address/port and inquire about the P2P port mapping table, can know that whether this packet is the P2P packet, sends into it HTB formation then.
CN2009100332307A 2009-06-10 2009-06-10 P2P network flow control method based on application layer detection Expired - Fee Related CN101599897B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100332307A CN101599897B (en) 2009-06-10 2009-06-10 P2P network flow control method based on application layer detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100332307A CN101599897B (en) 2009-06-10 2009-06-10 P2P network flow control method based on application layer detection

Publications (2)

Publication Number Publication Date
CN101599897A true CN101599897A (en) 2009-12-09
CN101599897B CN101599897B (en) 2012-02-22

Family

ID=41421155

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100332307A Expired - Fee Related CN101599897B (en) 2009-06-10 2009-06-10 P2P network flow control method based on application layer detection

Country Status (1)

Country Link
CN (1) CN101599897B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101808031A (en) * 2010-03-02 2010-08-18 北京邮电大学 Trusted improvement method of router
CN101964752A (en) * 2010-10-19 2011-02-02 杨忠明 Broadband network access method for dynamic adjustment resource allocation
CN101977146A (en) * 2010-10-25 2011-02-16 成都飞鱼星科技开发有限公司 Intelligent network traffic controller and implementation method thereof
CN102201981A (en) * 2011-03-31 2011-09-28 成都飞鱼星科技开发有限公司 Network video conferencing system based on video signal flow acceleration and acceleration method thereof
CN103036803A (en) * 2012-12-21 2013-04-10 南京邮电大学 Flow control method based on application layer detection
CN103312565A (en) * 2013-06-28 2013-09-18 南京邮电大学 Independent learning based peer-to-peer (P2P) network flow identification method
CN103812965A (en) * 2014-02-25 2014-05-21 北京极科极客科技有限公司 Router-based domain name classifying and processing method and device
CN104994028A (en) * 2015-07-15 2015-10-21 上海地面通信息网络有限公司 Bandwidth saving control device based on NAT address translator
CN105049368A (en) * 2015-08-25 2015-11-11 湖南餐智科技有限公司 Priority-based load balancing algorithm in hybrid network
CN106060011A (en) * 2016-05-12 2016-10-26 浪潮软件集团有限公司 Intranet and extranet interaction method, self-service tax handling system, extranet device and intranet device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100372310C (en) * 2006-04-25 2008-02-27 清华大学 P2P network management method based on federal model

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101808031A (en) * 2010-03-02 2010-08-18 北京邮电大学 Trusted improvement method of router
CN101964752A (en) * 2010-10-19 2011-02-02 杨忠明 Broadband network access method for dynamic adjustment resource allocation
CN101964752B (en) * 2010-10-19 2013-02-06 杨忠明 Broadband network access method for dynamic adjustment resource allocation
CN101977146B (en) * 2010-10-25 2013-04-17 成都飞鱼星科技开发有限公司 Intelligent network traffic controller and implementation method thereof
CN101977146A (en) * 2010-10-25 2011-02-16 成都飞鱼星科技开发有限公司 Intelligent network traffic controller and implementation method thereof
CN102201981A (en) * 2011-03-31 2011-09-28 成都飞鱼星科技开发有限公司 Network video conferencing system based on video signal flow acceleration and acceleration method thereof
CN103036803A (en) * 2012-12-21 2013-04-10 南京邮电大学 Flow control method based on application layer detection
CN103312565A (en) * 2013-06-28 2013-09-18 南京邮电大学 Independent learning based peer-to-peer (P2P) network flow identification method
CN103312565B (en) * 2013-06-28 2015-12-23 南京邮电大学 A kind of peer-to-peer network method for recognizing flux based on autonomous learning
CN103812965A (en) * 2014-02-25 2014-05-21 北京极科极客科技有限公司 Router-based domain name classifying and processing method and device
CN104994028A (en) * 2015-07-15 2015-10-21 上海地面通信息网络有限公司 Bandwidth saving control device based on NAT address translator
CN104994028B (en) * 2015-07-15 2019-04-26 上海地面通信息网络股份有限公司 Bandwidth conservation control device based on NAT address translator
CN105049368A (en) * 2015-08-25 2015-11-11 湖南餐智科技有限公司 Priority-based load balancing algorithm in hybrid network
CN106060011A (en) * 2016-05-12 2016-10-26 浪潮软件集团有限公司 Intranet and extranet interaction method, self-service tax handling system, extranet device and intranet device

Also Published As

Publication number Publication date
CN101599897B (en) 2012-02-22

Similar Documents

Publication Publication Date Title
CN101599897B (en) P2P network flow control method based on application layer detection
CN102045363B (en) Establishment, identification control method and device for network flow characteristic identification rule
CN102404396B (en) Method, device and system for identifying peer-to-peer (P2P) flow and equipment
CA2607607C (en) Traffic analysis on high-speed networks
CN100493094C (en) P2P data message detection method based on character code
CN103763154B (en) A kind of network flow detection method
CN103312565B (en) A kind of peer-to-peer network method for recognizing flux based on autonomous learning
CN108781171A (en) System and method for using data plane signal notice packet to capture in IPV6 environment
CN101841441B (en) Test method and system for flow control device and data stream playback device
US20070160073A1 (en) Packet communications unit
WO2011053284A1 (en) Methods and apparatus for detection of a nat device
CN102724317A (en) Network data flow classification method and device
CN102202064A (en) Method for extracting behavior characteristics of Trojan communication based on network data flow analysis
CN105245407A (en) Network sniffer based on socket and method thereof
CN110855493A (en) Application topological graph drawing device for mixed environment
CN102571946A (en) Realization method of protocol identification and control system based on P2P (peer-to-peer network)
CN107222403A (en) A kind of data transmission method, system and electronic equipment
CN101184089A (en) Port and content interweaved detection based protocol identifying method
CN103281158A (en) Method for detecting communication granularity of deep web and detection equipment thereof
CN105991353A (en) Fault location method and device
WO2002051077A1 (en) A method and system for distinguishing higher layer protocols of the internet traffic
CN102420830A (en) Peer-to-peer (P2P) protocol type identification method
Teufl et al. Infect-network traffic classification
CN108076070A (en) A kind of FASP agreements blocking-up method, device and analysis system
CN103200193A (en) Session creating method and session creating device in network equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20091209

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000219

Denomination of invention: P2P network flow control method based on application layer detection

Granted publication date: 20120222

License type: Common License

Record date: 20161121

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EC01 Cancellation of recordation of patent licensing contract
EC01 Cancellation of recordation of patent licensing contract

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000219

Date of cancellation: 20180116

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120222

Termination date: 20180610