Summary: | 碩士 === 逢甲大學 === 資訊工程學系 === 103 === With the development of network technology, a large number of P2P applications are widely used. Thus, it is important for network managers to analyze and understand what application traffics exist in the network. However, some users make use of the encrypted tunnels techniques, in order to avoid network management. Therefore, it has become an important issue how to identify network traffic in the encrypted tunnel. This paper proposes a novel scheme to generate features, called edges, based on packet length and packet inter-arrival time. Then, edges are used to detect whether or not the encrypted tunnel includes some specific P2P traffic. In addition, our proposed system generates edges, used for the encrypted tunnel, by different sorts of application traffic in plain text. In the experiment, the proposed scheme accurately identifies the encrypted tunnels if the one includes more than one kind of P2P application traffics.
|