Identify Encrypted P2P Traffic Using Edge

碩士 === 逢甲大學 === 資訊工程學系 === 103 === With the development of network technology, a large number of P2P applications are widely used. Thus, it is important for network managers to analyze and understand what application traffics exist in the network. However, some users make use of the encrypted tunnel...

Full description

Bibliographic Details
Main Authors: Yang, Yu-Si, 楊敔晞
Other Authors: 劉宗杰
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/74241889165303782906
id ndltd-TW-103FCU05392012
record_format oai_dc
spelling ndltd-TW-103FCU053920122016-08-21T19:04:43Z http://ndltd.ncl.edu.tw/handle/74241889165303782906 Identify Encrypted P2P Traffic Using Edge 使用邊識別加密P2P資料流 Yang, Yu-Si 楊敔晞 碩士 逢甲大學 資訊工程學系 103 With the development of network technology, a large number of P2P applications are widely used. Thus, it is important for network managers to analyze and understand what application traffics exist in the network. However, some users make use of the encrypted tunnels techniques, in order to avoid network management. Therefore, it has become an important issue how to identify network traffic in the encrypted tunnel. This paper proposes a novel scheme to generate features, called edges, based on packet length and packet inter-arrival time. Then, edges are used to detect whether or not the encrypted tunnel includes some specific P2P traffic. In addition, our proposed system generates edges, used for the encrypted tunnel, by different sorts of application traffic in plain text. In the experiment, the proposed scheme accurately identifies the encrypted tunnels if the one includes more than one kind of P2P application traffics. 劉宗杰 2015 學位論文 ; thesis 37 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 逢甲大學 === 資訊工程學系 === 103 === With the development of network technology, a large number of P2P applications are widely used. Thus, it is important for network managers to analyze and understand what application traffics exist in the network. However, some users make use of the encrypted tunnels techniques, in order to avoid network management. Therefore, it has become an important issue how to identify network traffic in the encrypted tunnel. This paper proposes a novel scheme to generate features, called edges, based on packet length and packet inter-arrival time. Then, edges are used to detect whether or not the encrypted tunnel includes some specific P2P traffic. In addition, our proposed system generates edges, used for the encrypted tunnel, by different sorts of application traffic in plain text. In the experiment, the proposed scheme accurately identifies the encrypted tunnels if the one includes more than one kind of P2P application traffics.
author2 劉宗杰
author_facet 劉宗杰
Yang, Yu-Si
楊敔晞
author Yang, Yu-Si
楊敔晞
spellingShingle Yang, Yu-Si
楊敔晞
Identify Encrypted P2P Traffic Using Edge
author_sort Yang, Yu-Si
title Identify Encrypted P2P Traffic Using Edge
title_short Identify Encrypted P2P Traffic Using Edge
title_full Identify Encrypted P2P Traffic Using Edge
title_fullStr Identify Encrypted P2P Traffic Using Edge
title_full_unstemmed Identify Encrypted P2P Traffic Using Edge
title_sort identify encrypted p2p traffic using edge
publishDate 2015
url http://ndltd.ncl.edu.tw/handle/74241889165303782906
work_keys_str_mv AT yangyusi identifyencryptedp2ptrafficusingedge
AT yángyǔxī identifyencryptedp2ptrafficusingedge
AT yangyusi shǐyòngbiānshíbiéjiāmìp2pzīliàoliú
AT yángyǔxī shǐyòngbiānshíbiéjiāmìp2pzīliàoliú
_version_ 1718379492563484672