首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于贝叶斯网络的Peer-to-Peer识别方法
引用本文:李君,张顺颐,王浩云,李翠莲.基于贝叶斯网络的Peer-to-Peer识别方法[J].应用科学学报,2009,27(2):124-130.
作者姓名:李君  张顺颐  王浩云  李翠莲
作者单位:1. 南京邮电大学信息网络技术研究所,南京210003 2. 浙江万里学院通信工程系,浙江宁波315100
基金项目:国家高技术研究发展计划(863计划),浙江省自然科学基金,江苏省普通高校研究生创新计划 
摘    要:网络业务分类与识别是网络管理、网络规划和安全的必要途径,而Peer-to-Peer (P2P)流量由于采用伪装端口、动态端口以及应用层加密,已成为业务分类与识别的主要难点. 该文提出了P2P业务的精确识别方法,通过对流统计特性的分析,提取相关特征属性,应用遗传算法选取最优特征属性子集,并采用贝叶斯网络机器学习方法识别P2P流量. 实验表明K2,TAN和BAN能有效快速地识别P2P业务,分类精度高达95%以上,很大程度上优于朴素贝叶斯分类和BP神经网络方法. 同时该系统具有可扩展性,能够识别未知的P2P流量,并适用于实时分类识别环境.

关 键 词:Peer-to-Peer  流量识别  朴素贝叶斯  贝叶斯网络  
收稿时间:2008-08-18
修稿时间:2008-12-22

Peer-to-Peer Traffic Identification Using Bayesian Networks
LI Jun,ZHANG Shun-yi,WANG Hao-yun,LI Cui-lian.Peer-to-Peer Traffic Identification Using Bayesian Networks[J].Journal of Applied Sciences,2009,27(2):124-130.
Authors:LI Jun  ZHANG Shun-yi  WANG Hao-yun  LI Cui-lian
Institution:1. Institute of Information Network Technology, Nanjing University of Posts and Telecommunications,; Nanjing 210003, China; 2. Department of Telecommunication Engineering, Zhejiang Wanli University, Ningbo 315100,; Zhejiang Province, China
Abstract:Accurate traffic classification is vital to numerous network activities, such as security monitoring, quality of service provisioning and network planning. However, current P2P applications, which generate a substantial volume of Internet traffic, use dynamic port numbers, HTTP masquerading and payload encryption to avoid detection. In this paper, we present an accurate P2P identification method using Bayesian networks. Based on the abstracted attributes of flow statistics, the optimal attribute subset is selected using genetic algorithms and P2P traffic is identified using Bayesian networks. We evaluate the algorithms and compare them to the previously used Naive Bayesian model and BP perceptron. Experimental results show that the proposed algorithms achieve better overall accuracy up to 95% with less cost. Further, our result indicates that the approaches are capable of identifying unknown P2P traffic and applicable to the real-time applications.
Keywords:Peer-to-Peer
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《应用科学学报》浏览原始摘要信息
点击此处可从《应用科学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号