Identify Encrypted P2P Traffic Using Edge
碩士 === 逢甲大學 === 資訊工程學系 === 103 === With the development of network technology, a large number of P2P applications are widely used. Thus, it is important for network managers to analyze and understand what application traffics exist in the network. However, some users make use of the encrypted tunnel...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/74241889165303782906 |
id |
ndltd-TW-103FCU05392012 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-103FCU053920122016-08-21T19:04:43Z http://ndltd.ncl.edu.tw/handle/74241889165303782906 Identify Encrypted P2P Traffic Using Edge 使用邊識別加密P2P資料流 Yang, Yu-Si 楊敔晞 碩士 逢甲大學 資訊工程學系 103 With the development of network technology, a large number of P2P applications are widely used. Thus, it is important for network managers to analyze and understand what application traffics exist in the network. However, some users make use of the encrypted tunnels techniques, in order to avoid network management. Therefore, it has become an important issue how to identify network traffic in the encrypted tunnel. This paper proposes a novel scheme to generate features, called edges, based on packet length and packet inter-arrival time. Then, edges are used to detect whether or not the encrypted tunnel includes some specific P2P traffic. In addition, our proposed system generates edges, used for the encrypted tunnel, by different sorts of application traffic in plain text. In the experiment, the proposed scheme accurately identifies the encrypted tunnels if the one includes more than one kind of P2P application traffics. 劉宗杰 2015 學位論文 ; thesis 37 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 逢甲大學 === 資訊工程學系 === 103 === With the development of network technology, a large number of P2P applications are widely used. Thus, it is important for network managers to analyze and understand what application traffics exist in the network. However, some users make use of the encrypted tunnels techniques, in order to avoid network management. Therefore, it has become an important issue how to identify network traffic in the encrypted tunnel. This paper proposes a novel scheme to generate features, called edges, based on packet length and packet inter-arrival time. Then, edges are used to detect whether or not the encrypted tunnel includes some specific P2P traffic. In addition, our proposed system generates edges, used for the encrypted tunnel, by different sorts of application traffic in plain text. In the experiment, the proposed scheme accurately identifies the encrypted tunnels if the one includes more than one kind of P2P application traffics.
|
author2 |
劉宗杰 |
author_facet |
劉宗杰 Yang, Yu-Si 楊敔晞 |
author |
Yang, Yu-Si 楊敔晞 |
spellingShingle |
Yang, Yu-Si 楊敔晞 Identify Encrypted P2P Traffic Using Edge |
author_sort |
Yang, Yu-Si |
title |
Identify Encrypted P2P Traffic Using Edge |
title_short |
Identify Encrypted P2P Traffic Using Edge |
title_full |
Identify Encrypted P2P Traffic Using Edge |
title_fullStr |
Identify Encrypted P2P Traffic Using Edge |
title_full_unstemmed |
Identify Encrypted P2P Traffic Using Edge |
title_sort |
identify encrypted p2p traffic using edge |
publishDate |
2015 |
url |
http://ndltd.ncl.edu.tw/handle/74241889165303782906 |
work_keys_str_mv |
AT yangyusi identifyencryptedp2ptrafficusingedge AT yángyǔxī identifyencryptedp2ptrafficusingedge AT yangyusi shǐyòngbiānshíbiéjiāmìp2pzīliàoliú AT yángyǔxī shǐyòngbiānshíbiéjiāmìp2pzīliàoliú |
_version_ |
1718379492563484672 |