Identify Encrypted P2P Traffic Using Edge

碩士 === 逢甲大學 === 資訊工程學系 === 103 === With the development of network technology, a large number of P2P applications are widely used. Thus, it is important for network managers to analyze and understand what application traffics exist in the network. However, some users make use of the encrypted tunnel...

Full description

Bibliographic Details
Main Authors: Yang, Yu-Si, 楊敔晞
Other Authors: 劉宗杰
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/74241889165303782906
Description
Summary:碩士 === 逢甲大學 === 資訊工程學系 === 103 === With the development of network technology, a large number of P2P applications are widely used. Thus, it is important for network managers to analyze and understand what application traffics exist in the network. However, some users make use of the encrypted tunnels techniques, in order to avoid network management. Therefore, it has become an important issue how to identify network traffic in the encrypted tunnel. This paper proposes a novel scheme to generate features, called edges, based on packet length and packet inter-arrival time. Then, edges are used to detect whether or not the encrypted tunnel includes some specific P2P traffic. In addition, our proposed system generates edges, used for the encrypted tunnel, by different sorts of application traffic in plain text. In the experiment, the proposed scheme accurately identifies the encrypted tunnels if the one includes more than one kind of P2P application traffics.