CN102571946A - Realization method of protocol identification and control system based on P2P (peer-to-peer network) - Google Patents

Realization method of protocol identification and control system based on P2P (peer-to-peer network) Download PDF

Info

Publication number
CN102571946A
CN102571946A CN2011104493610A CN201110449361A CN102571946A CN 102571946 A CN102571946 A CN 102571946A CN 2011104493610 A CN2011104493610 A CN 2011104493610A CN 201110449361 A CN201110449361 A CN 201110449361A CN 102571946 A CN102571946 A CN 102571946A
Authority
CN
China
Prior art keywords
flow
message
identification
module
peer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011104493610A
Other languages
Chinese (zh)
Other versions
CN102571946B (en
Inventor
王汝传
赵丹
孙力娟
李致远
韩志杰
林巧民
肖甫
黄海平
顾翔
邵星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201110449361.0A priority Critical patent/CN102571946B/en
Publication of CN102571946A publication Critical patent/CN102571946A/en
Application granted granted Critical
Publication of CN102571946B publication Critical patent/CN102571946B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention aims at providing a P2P flow identification and control system based on machine learning and a realization method of the system. The existing P2P flow is a burden of a network, the burden problem can be effectively controlled by identifying the P2P flow, so that the resource bandwidth pressure brought about by the P2P flow can be greatly reduced. Software in the invention has main functions of detecting and controlling the P2P flow, wherein a detecting system realized by an inner core module and a PTCM mechanism are core parts. A regular expression matching method is used for identifying unsecure flow, flow which can not be identified is classified by adopting an ensemble learning algorithm, and hash marking can be carried out on matched P2P flow, therefore, the purpose of combining a DPI mode and a TLI mode can be realized, the classified flow is then sent to the PICM mechanism for the generation of intelligent control strategies, and finally, a TC function module self-provided in a LINUX system is controlled by a message queue.

Description

A kind of based on the agreement identification of peer-to-peer network and the implementation method of control system
Technical field
The present invention is a kind of agreement identification and control system to the peer-to-peer network service, and is main with the agreement identification and the control problem that solve peer-to-peer network, belongs to the peer-to-peer network field.
Background technology
The Peer-to-Peer application development had captured a plurality of applications rapidly and with gesture with lightning speed in recent years: the file-sharing application that with BitTorrent, Napster, eMule is representative is experienced the download tool that becomes main flow rapidly with its freedom, equality, open resource-sharing mode and user's download at a high speed; With Skype, ICQ, MSN is that the voice communication software of representative relies on its smoothness speech quality, cheap cost of the phone call make the networking telephone popularize rapidly clearly; Telecommunication service is constituted huge impact; Rely on broadcast experience, the rich and colourful items content of its clear and smooth to make Web TV break away from bandwidth bottleneck with PPlive, QQ is live, PPstream is representative Streaming Media application software, thereby become the new distribution platforms of multimedia resource such as video, TV programme, film.Be accompanied by the fast development that P2P uses, the negative effect that it brought also becomes and can not be ignored.Thereby virus, wooden horse are borrowing P2P file-sharing platform to spread at faster speed, have caused bigger destruction; Unhealthy contents such as pornographic, violence are distributed shared without restriction; Pirate music, films and television programs are easily escaped legal constraints; The network bandwidth is engulfed by a large amount of P2P data, and non-P2P user's network is experienced serious decline, and enterprise's key application can not get bandwidth guarantee; The asymmetric flow model in tradition the Internet is broken, and is no longer reasonable with the monthly payment charge method that this theory is the basis, and the interests of ISP are on the hazard.P2P uses; Particularly file-sharing, Streaming Media are used; Not only there are many this type of problems, use the choice of dynamical port simultaneously, pretend strategy escape normal flow amount detection machine systems such as other flow, enciphered data, anonymous communication, make these problems be difficult to control more.According to ASSOCIATE STATISTICS, up to now, P2P has occupied the flow of the Internet more than 70%.
The identification of research P2P flow also just becomes the previous relatively popular topic of order with control; And all also there are many disadvantages in the algorithm, mechanism, the solution that had identification of P2P flow and control in recent years now: the identification of existing P 2P flow usually need be foreseen the specifying information of P2P agreement in advance; Yet present P2P network New Deal emerges in an endless stream; Often change transport layer port and communicate, hide detection through application layer encryption even; Hysteresis quality is also compared in existing P 2P flow control, and human factor is many, can not accomplish the more accurately rational distribution network bandwidth of intelligence, and therefore bigger room for improvement is still arranged.
On economic benefit, the achievement of agreement identification and Control Study is with broad market prospect.Particularly use increasingly extensive at current P2P; When development was maked rapid progress, when enjoying the various content sharing services that P2P provides, P2P used and also brings many negative problems to people; The achievement in research of this paper will be for saving Internet resources; Improve bandwidth availability ratio, guarantee the dynamic equilibrium of network, network is turned round effectively sound assurance is provided.On social benefit, agreement identification is the hot issue that needs to be resolved hurrily in the current P2P application with control, and the agreement identification of this paper research is attempted obtaining certain breakthrough aspect the solution of this problem with control method.Agreement identification can promote present P2P network to develop to orderly direction with Control Study, for network manager especially operator, and reasonable use that can coordinate network resources, and guarantee that the user enjoys P2P service stable, that have QoS to ensure.Therefore the achievement in research of this paper is changed into product and will have wide market prospects.The research work of this paper simultaneously helps controlling the P2P flow to excessively the seizing of the network bandwidth, and also helps to safeguard the health environment and a networked society of building a harmony of the Internet.
Summary of the invention
Technical problem: the purpose of this invention is to provide the implementation method of a kind of agreement identification based on peer-to-peer network and control system, the agreement of peer-to-peer network is discerned and controlled.The present invention compares scheme in the past, and this scheme has novelty, flexibility, is prone to autgmentability and ease for operation, has good market prospects.
Technical scheme: the present invention is that concentrate, that can manage, controlled.The major function of this software is identification and control P2P flow, and wherein the recognition system and the PTCM mechanism of kernel module realization are the cores.Use the method identification unencryption flow of regular expression coupling; The flow that can not discern adopts machine learning algorithm to do classification; P2P flow with coupling carries out the Hash sign simultaneously, has so just reached the purpose that DPI and TLI dual mode combine, and the flow that will classify is then sent into the generation that PTCM mechanism is carried out Intelligent Control Strategy; Through message mechanism control strategy is issued bridge system at last, the bridge system TC that control carries according to control strategy.
The protocal analysis logic function mainly is made up of following components: the logic module of non-encrypted message identification module, encryption message identification module, PTCM mechanism module and message controlled function.
The step that this protocol analysis system implementation method comprises is:
Step 1). carry out demand analysis, agreement identification and the function that control system need be accomplished are analyzed, and generate the demand analysis document;
Step 2). according to the analytical documentation design module of step 1, the function of each module is carried out labor, generate logical relation and function declaration document between each module;
Step 3). according to the document of step 2; The non-encrypted message identification module of design and identification of realization agreement and control system and encryption message identification module; Recognition efficiency in protocol analysis system; Affect whole system operation efficient, the message identification module comes some unencrypted network messages in the agreement identification peer-to-peer network according to message length and fixed bit tagged word;
Step 4). according to the document of step 2, design with realize the non-encrypted message after agreement identification will discern with control system and encrypt message and carry out Hash, stamp label after, send the machine-processed module of PTCM to;
Step 5). according to the document of step 2, design and the PTCM mechanism function that realizes agreement identification and control system, this module is predicted according to the P2P flow of identification, generates the flow control strategy of intelligence then.
Step 6). according to the document of step 2; Design and the message controlled function that realizes protocol analysis system; This module realizes the non-encrypted control strategy that generates with message identification module and the PTCM mechanism of encrypting is mail to the message control system through message mechanism, thereby the message control system is according to the control strategy reasonable distribution network bandwidth that receives.
Beneficial effect: the present invention extracts one to the identification of peer-to-peer network protocol massages and the implementation method of control system, and the method for comparing in the past has some significant advantages:
Recognition efficiency is high: the present invention carries out message identification in network layer, shortens message identification path, and the present invention simultaneously only discerns uplink traffic, and downlink traffic is not handled, and alleviates the processing pressure of CPU, improves the recognition efficiency of message.Carry out separate processes to encrypting message and non-encrypted message simultaneously; Make the recognition accuracy of message reach 100%; Can not occur failing to judge, situation such as erroneous judgement, and traditional on router, carry out identification mode and generally only can reach 90%~95% identification hit rate.
Modularized design: the identification of whole agreement is divided according to functional module with control system, and non-encrypted message recognition function adopts deep layer scanning DPI technology, comes agreement identification association message according to the tagged word of message.Encrypting the message recognition function adopts the machine learning classification algorithm to carry out Classification and Identification.PTCM mechanism then is that the time series algorithm in the machine learning is predicted the P2P flow, thereby generates the flow control strategy of intelligence.The message controlled function is carried out reasonable distribution according to the flow control strategy to the network bandwidth.
Good system extension property: owing to what adopt between the system module is separate modular; Function parallelization stratification design; Communication mechanism between the system module adopts hierarchical setting fully; Therefore can add new function easily, the prior function of also can upgrading at an easy rate is so this system has good extensibility.
The reliability and stability of height: the unit testing through to agreement identification and control system shows that this protocol analysis system operation conditions is good, and occupying system resources is few, has good fault tolerant mechanism and disaster recovery capability.
Description of drawings
Fig. 1 is the physics networking diagram of agreement identification and control system,
Fig. 2 is the flow chart of non-encrypted message identification module,
Fig. 3 is a schematic diagram of encrypting the message identification module,
Fig. 4 is the schematic diagram of PTCM mechanism module,
Embodiment
Architecture
Non-encrypted message recognition function: the P2P flow recognition technology that detects based on application layer data is through protocal analysis and reduction technique; Extract P2P application layer data (being P2P load); Through analyzing the protocol characteristic value that P2P load is comprised, judge whether to belong to P2P and use.Therefore, these class methods also are called deep layer packet detection technique (DPI).In deep layer packet detection technique,, set up feature database through the load of concrete P2P agreement and corresponding P2P system thereof is carried out feature extraction.Real-time network stream for flowing through adopts pattern matching algorithm, judges wherein whether comprise the characteristic string in the feature database.If the characteristic matching success, this network flow is exactly the P2P data.Message identification division of the present invention promptly adopts the DPI scanning technique, comes Hash search message and some relevant mutual messages in the agreement identification Ares specific network service according to the fixed bit tagged word.
Encrypt the message recognition function: owing to encrypt the complexity of message; The P2P flow recognition technology that employing detects based on application layer data is no longer valid, so will adopt the sorting algorithm in the machine learning to carry out message identification, this module is image data at first; Obtain training sample; Set up model through flow attribution selection algorithm and machine learning algorithm again, reduced model then, and then in real time the data message is carried out discriminator through reduced model; The successful P2P flow of classifying carries out the Hash sign, sends it to PTCM module then; The non-P2P flow that identifies will be lost and be left intact.
The main generation that realizes P2P flow control strategy of PTCM mechanism function: PTCM mechanism; This mechanism is through reasonably predicting the P2P flow after the identification; Carry out the flow counting of threshold value up and down again; The minimum and maximum bandwidth of adjustment of intelligence, and the Intelligent Control Strategy that generates the most at last sends to bridge system through message mechanism, the distribution network bandwidth that bridge system is intelligent according to control strategy.
Method flow
This part specifies the design and the realization of summary of the invention various piece:
Non-encrypted message recognition function realizes: utilize the key data structure Socket Buffer (sk_buff) of the ICP/IP protocol stack in the Linux netfilter, the data of coming the operations flows warp.If message fragment, or do not have linking number, then return and do not have operation.
When a message flow through first Hook Function NF_IP_PRE_ROUTING, can be sent to storage temporarily among the control structure sk_buff of internal memory.In this control structure; The pointer that points to network message (as: skb->nh) is arranged; Whether at first discern message is the TCP message; The network layer that provides according to the sk_buff structure again and the size of transport layer header, both head length before skb->nh adds, pointer has just pointed to the head (as: Appdata pointer) of application layer data.The total length of packet also is provided, through deducting the size of network layer and transport layer header, the length of the layer data that just can be applied in the sk_buff.After above-mentioned preparation is accomplished, just can compare the ares message that needs identification, just through message length and fixed bit are mated to confirm through the Appdata pointer.What store in the sk_buff is the network bytes preface, thus comparison the time need use _ constant_htons () or _ constant_htonl () unifies network bytes preface and host byte preface.
The present invention need discern the protocol massages in the peer-to-peer network, judges whether the message into P2P, is not then not deal with.
Encrypting the message recognition function realizes: the P2P message that the present invention is directed to encryption; This module is at first through the harvester image data; Obtain training sample; Set up model through flow attribution selection algorithm and machine learning algorithm again, reduced model then, and then real-time data are carried out discriminator.
In network application, it is to be TCP with a certain protocol that circulation often is defined as, UDP, and among the ICMP one also has a pair of specific port between two Computer IP addresses, to transmit one or more IP packets sometimes.This five-tuple information (source IP address, purpose IP address, source port, destination interface, protocol type) has constituted the sign of distinguishing a stream.These information are present in each IP packet.
The characteristic of flow is considered to discern and distinguish following unknown network flow usually, the attribute of the flow that characteristic normally obtains through the calculation of mass data bag.Such as looking like maximum or minimum packet length in one direction, the duration of stream, a series of values such as the time of advent of tundish.
The most original stream is disabled in flow identification, and available is a series of attributes of describing stream.These attributes comprise source end and the port numbers of destination end and the behavioural characteristic of flow etc. of stream; These attributes can be used for different traffic classifications; But it is very worthless being to use whole attributes to carry out learning classification; Be of value to the accurately attribute of classification of flow but need from numerous attributes, pick out, remove incoherent and redundant attribute, this process just is called attribute and selects.And the attribute selection algorithm can be used for selecting to help the attribute of the accurate classification of flow.
This paper invents designed flow attributive character computing system Fullstats and is based upon under the Linux environment.This system can realize the transfer process from the primitive network packet to attributive character value file easily through the order line form.
The computational process of flow attribution characteristic can be divided into following four steps:
(1) grasps network packet with Technology of Network Sniffer;
(2) captured packets is classified by stream (the same stream of the genus that five-tuple information is identical), each stream comprises the plurality of data bag;
(3) add up the attributive character of each stream, and calculate 248 attributive character values;
(4) the attributive character value that obtains is done some format conversion, become the file format that needs.
According to above-mentioned 4 steps, utilize four softwares under the Linux environment to accomplish computing system Fullstats.These four softwares are respectively:
Tcpdemux: the demultiplexer of stream, be used for the data distribution of catching by sniffer, it will be new file of each stream.
Tcptrace: this software can be analyzed the characteristic of the stream that is hunted down, and produces abundant statistical value, i.e. characteristic value.
Outstanding sniffer under the Tcpdump:Linux, i.e. network packet catcher, filtering function is also very powerful.
Tcpslice: extract part Tcpdump file, or bonding these files.
Step 1 in the preamble is accomplished by Tcpdump, and step 2 is accomplished by Tcpdemux, Tcpdump, Tcptrace, the common completing steps 3 of Tcpslice.
PTCM mechanism function: the present invention designs the generation Intelligent Control Strategy, and the P2P flow control algorithm of foundation comprises that mainly time series models are predicted, predicted flow rate is compared and adjusts control strategy according to counter.
1) with the C programming time series predicting model being carried out program realizes;
2) set user's maximum broadband value BS, burst flow upper limit maximum uBS, lower limit minimum value dMS, pass through about threshold value counter uCount and dCount, wherein dMS<uBS<BS;
3) model prediction goes out the flow value Q of the next Δ t of P2P flow in the time according to FARIMA Δ t
4) when the predicted value of first Δ t P2P flow constantly produced, timer then picked up counting;
5) if Q Δ tGreater than uBS, count value uCount increases by one; If Q Δ tLess than dMS, count value dCount subtracts one;
6) when in m Δ t time period, if during uCount>dCount, then uBS improves (uCount-dCount) individual grade d n, and dMS reduces (uCount-dCount) individual grade d n, and satisfy dMS<uBS<BS; If during uCount<dCount, uBS (dCount-uCount) individual grade d that descends then n, and dMS rising (dCount-uCount) individual grade d n, and satisfy dMS<uBS<BS.Its middle grade d n = BS - DMS n .

Claims (1)

1. one kind based on the implementation method of the agreement of peer-to-peer network identification with control system, it is characterized in that the step that this method comprises is:
Step 1). carry out demand analysis, agreement identification and the function that control system need be accomplished are analyzed, and generate the demand analysis document;
Step 2). according to the analytical documentation design module of step 1), the function of each module is carried out labor, generate logical relation and function declaration document between each module;
Step 3). according to step 2) document; The non-encrypted message identification module of design and identification of realization agreement and control system and encryption message identification module; Recognition efficiency in protocol analysis system; Affect whole system operation efficient, the message identification module comes some unencrypted network messages in the agreement identification peer-to-peer network according to message length and fixed bit tagged word;
Step 4). according to step 2) document, design with realize the non-encrypted message after agreement identification will discern with control system and encrypt message and carry out Hash, stamp label after, send the peer-to-peer network flow-control module PTCM of generation Intelligent Control Strategy to;
Step 5). according to step 2) document; Design and the PTCM mechanism function that realizes agreement identification and control system; This module is predicted according to the peer-to-peer network flow of identification; Carry out the flow counting of threshold value up and down again, the minimum and maximum bandwidth of adjustment of intelligence generates intelligent flow control strategy then;
Step 6). according to step 2) document; Design and the message controlled function that realizes protocol analysis system; This module realizes the non-encrypted control strategy that generates with message identification module and the PTCM mechanism of encrypting is mail to the message control system through message mechanism, thereby the message control system is according to the control strategy reasonable distribution network bandwidth that receives.
CN201110449361.0A 2011-12-28 2011-12-28 Realization method of protocol identification and control system based on P2P (peer-to-peer network) Active CN102571946B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110449361.0A CN102571946B (en) 2011-12-28 2011-12-28 Realization method of protocol identification and control system based on P2P (peer-to-peer network)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110449361.0A CN102571946B (en) 2011-12-28 2011-12-28 Realization method of protocol identification and control system based on P2P (peer-to-peer network)

Publications (2)

Publication Number Publication Date
CN102571946A true CN102571946A (en) 2012-07-11
CN102571946B CN102571946B (en) 2015-07-01

Family

ID=46416406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110449361.0A Active CN102571946B (en) 2011-12-28 2011-12-28 Realization method of protocol identification and control system based on P2P (peer-to-peer network)

Country Status (1)

Country Link
CN (1) CN102571946B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103036803A (en) * 2012-12-21 2013-04-10 南京邮电大学 Flow control method based on application layer detection
CN103312565A (en) * 2013-06-28 2013-09-18 南京邮电大学 Independent learning based peer-to-peer (P2P) network flow identification method
CN105049437A (en) * 2015-08-04 2015-11-11 浪潮电子信息产业股份有限公司 Method for filtering data of network application layer
CN105430021A (en) * 2015-12-31 2016-03-23 中国人民解放军国防科学技术大学 Encrypted traffic identification method based on load adjacent probability model
CN105530302A (en) * 2015-12-15 2016-04-27 中国联合网络通信集团有限公司 Method and system for controlling uplink bandwidth
CN108028807A (en) * 2015-10-09 2018-05-11 华为技术有限公司 Method and system for on-line automatic identification Model of network traffic
CN111757041A (en) * 2020-06-17 2020-10-09 许继集团有限公司 Network video conference flow identification method and device
CN114553546A (en) * 2022-02-24 2022-05-27 杭州迪普科技股份有限公司 Message capturing method and device based on network application

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070248103A1 (en) * 2006-04-19 2007-10-25 Cisco Technology, Inc. Techniques for integrated routing of call circuit signaling and the internet protocol
CN101494663A (en) * 2009-01-23 2009-07-29 联想网御科技(北京)有限公司 Active identification method and apparatus based on peer-to-peer network
CN101909077A (en) * 2010-07-09 2010-12-08 北京邮电大学 Method and device for identifying peer-to-peer services and access network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070248103A1 (en) * 2006-04-19 2007-10-25 Cisco Technology, Inc. Techniques for integrated routing of call circuit signaling and the internet protocol
CN101494663A (en) * 2009-01-23 2009-07-29 联想网御科技(北京)有限公司 Active identification method and apparatus based on peer-to-peer network
CN101909077A (en) * 2010-07-09 2010-12-08 北京邮电大学 Method and device for identifying peer-to-peer services and access network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵丹 等: "《基于集成学习的P2P流量识别模型》", 《南京邮电大学学报(自然科学版)》, vol. 31, no. 4, 31 August 2011 (2011-08-31) *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103036803A (en) * 2012-12-21 2013-04-10 南京邮电大学 Flow control method based on application layer detection
CN103312565A (en) * 2013-06-28 2013-09-18 南京邮电大学 Independent learning based peer-to-peer (P2P) network flow identification method
CN103312565B (en) * 2013-06-28 2015-12-23 南京邮电大学 A kind of peer-to-peer network method for recognizing flux based on autonomous learning
CN105049437A (en) * 2015-08-04 2015-11-11 浪潮电子信息产业股份有限公司 Method for filtering data of network application layer
CN108028807A (en) * 2015-10-09 2018-05-11 华为技术有限公司 Method and system for on-line automatic identification Model of network traffic
CN105530302A (en) * 2015-12-15 2016-04-27 中国联合网络通信集团有限公司 Method and system for controlling uplink bandwidth
CN105430021A (en) * 2015-12-31 2016-03-23 中国人民解放军国防科学技术大学 Encrypted traffic identification method based on load adjacent probability model
CN105430021B (en) * 2015-12-31 2018-06-12 中国人民解放军国防科学技术大学 Encryption method for recognizing flux based on the adjacent probabilistic model of load
CN111757041A (en) * 2020-06-17 2020-10-09 许继集团有限公司 Network video conference flow identification method and device
CN114553546A (en) * 2022-02-24 2022-05-27 杭州迪普科技股份有限公司 Message capturing method and device based on network application
CN114553546B (en) * 2022-02-24 2023-07-04 杭州迪普科技股份有限公司 Message grabbing method and device based on network application

Also Published As

Publication number Publication date
CN102571946B (en) 2015-07-01

Similar Documents

Publication Publication Date Title
CN102571946B (en) Realization method of protocol identification and control system based on P2P (peer-to-peer network)
CN102724317B (en) A kind of network traffic data sorting technique and device
WO2018054342A1 (en) Method and system for classifying network data stream
CN103312565B (en) A kind of peer-to-peer network method for recognizing flux based on autonomous learning
CN106815112B (en) Massive data monitoring system and method based on deep packet inspection
CN103078897B (en) A kind of system realizing Web service fine grit classification and management
CN102035698B (en) HTTP tunnel detection method based on decision tree classification algorithm
CN100550909C (en) A kind of system, method and apparatus of realizing professional perception
CN105871832A (en) Network application encrypted traffic recognition method and device based on protocol attributes
CN102045305B (en) Method and system for monitoring and tracking multimedia resource transmission
CN103139315A (en) Application layer protocol analysis method suitable for home gateway
CN105162626A (en) Network traffic depth identification system and method based on many-core processor
CN106789242A (en) A kind of identification application intellectual analysis engine based on mobile phone client software behavioral characteristics storehouse
CN104994016A (en) Method and apparatus for packet classification
CN106550241A (en) Video traffic identifying system and virtualization dispositions method
WO2010139237A1 (en) Method and device for deep packet inspection
CN106789728A (en) A kind of voip traffic real-time identification method based on NetFPGA
CN100466549C (en) Method of identifing VOIP flow based on SIP protocol process performance
CN101127690A (en) Identification method for next generation of network service traffic
Li et al. NNSplit-SØREN: Supporting the model implementation of large neural networks in a programmable data plane
CN101321097A (en) Tencent network living broadcast business recognition method based on payload depth detection
CN113382039B (en) Application identification method and system based on 5G mobile network flow analysis
CN100452728C (en) Method for distinguishing RTP/RTCP flow capacity
CN101984635B (en) Method and system for flow identification of point to point (P2P) protocol
CN102714652A (en) Supervision of a communication session comprising several flows over a data network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20120711

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000217

Denomination of invention: Realization method of protocol identification and control system based on P2P (peer-to-peer network)

Granted publication date: 20150701

License type: Common License

Record date: 20161118

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EC01 Cancellation of recordation of patent licensing contract

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000217

Date of cancellation: 20180116

EC01 Cancellation of recordation of patent licensing contract