簡易檢索 / 詳目顯示

研究生: 林冠豪
Lin, Guan-Hao
論文名稱: 基於DNS查詢特徵之新式P2P辨識方法
A Novel Mechanism to Identify Peer-to-Peer Applications Based on DNS Query
指導教授: 黃能富
Huang, Nen-Fu
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2009
畢業學年度: 97
語文別: 英文
論文頁數: 68
中文關鍵詞: 點對點辨識
外文關鍵詞: Peer-to-Peer, Identify
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來P2P (Peer-to-Peer)軟體的使用大幅增加,目前整個網際網路流量大約有70%都是P2P軟體的流量,而且比例還在增加當中。面對如此大量的新種類網路流量,現今文獻上已經有很多研究針對這個問題提出了一些方法,如:通訊埠(Port-based)與字串特徵(Signature-based)等。雖然效果也都不錯,但畢竟這些方法都有一些限制存在。例如:當P2P軟體使用隨機埠(Random Port)時,通訊埠方法將不再有效,甚至會出現相當大比例的誤判與漏判;而且因為一些隱私與安全上的顧慮,有時候網管者不被允許存取封包的資料內容,這樣字串特徵比對方法就會完全失效,更何況最近的P2P軟體為了躲避偵測還將資料內容加密,這樣一來即使可以存取封包的資料部分,此方法還是一樣無效。
    為了有效偵測P2P軟體的使用,本論文特別針對目前最熱門且最多人使用的幾項P2P軟體作研究,其中包括:BitTorrent, eMule, Ares, iMesh, Thunder, PPSteam, PPLive, TVAnts, SopCast and Skype。整理出這幾個P2P軟體的特性與行為,並提出一個有效且不需複雜計算的方法用來偵測這些P2P軟體。我們將設計一個簡單的P2P偵測系統並納入我們的偵測方法,然後試著利用我們錄下來的網路流量來驗證這個方法的準確度。實驗證明我們的方法不但有效,而且也因為不需複雜計算而可以作到即時流量分類。


    CHAPTER 1 INTRODUCTION 1.1 Purpose 1.2 P2P Network 1.3 Identification 1.4 Evaluation 1.5 Summary CHAPTER 2 RELATED WORK CHAPTER 3 ANALYSIS 3.1 P2P Network 3.1.1 Stream Media 3.1.1.1 PPLive 3.1.1.2 PPStream 3.1.1.3 TVAnts 3.1.1.4 SopCast 3.1.2 Instant Messenger 3.1.2.1 Skype 3.1.3 File Transfer 3.1.3.1 BitTorrent 3.1.3.2 eMule 3.1.3.3 iMesh 3.1.3.4 Thunder 3.1.3.5 Ares 3.2 Methodology CHAPTER 4 Evaluation 4.1 Implementation 4.2 Experimental Results CHAPTER 5 Conclusion

    [1] D. Moore, K. Keys, R. Koga, E. Lagache, and K. C. Claffy, “CoralReef Software Suite as a Tool for System and Network Administrators,” USENIX conference on System administration, San Diego, California, December 2001, pp. 4-7.
    [2] C. Logg and L. Cottrell, “Characterization of the Traffic between SLAC and the Internet,” http://www.slac.stanford.edu/comp/net/slac-netow/html/SLAC-netow.htm, July 2003.
    [3] T. Karagiannis, A. Broido, N. Brownlee, K. Claffy, and M. Faloutsos, “Is P2P Dying or Just Hiding?” IEEE GLOBECOM, Dallas, Texas, vol. 3, November 2004, pp 1532-1538.
    [4] A. Moore and D. Zuev, “Internet Traffic Classification Using Bayesian Analysis Techniques,” ACM SIGMETRICS, Alberta, Canada, June 2005, pp. 50-60.
    [5] T. Karagiannis, D. Papagiannaki, and M. Faloutsos, “BLINC: Multilevel Traffic Classification in the Dark,” ACM SIGCOMM, Philadelphia PA, USA, August 2005, pp. 229-240.
    [6] A. Moore and K. Papagiannaki, “Toward the Accurate Identification of Network Applications,” International Workshop of Passive and Active Measurement, Boston MA, USA, vol. 3431, 31 March 2005, pp. 41-54.
    [7] Wireshark, “http://www.wireshark.org/”.
    [8] K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, “A Survey and Comparison of Peer-to-Peer Overlay Network Schemes,” IEEE Communications Surveys and Tutorials 7, 2005, pp. 72-93.
    [9] F. DePaoli and L. Mariani, “Dependability in Peer-to-Peer Systems,” IEEE Internet Computing, July-August 2004, pp. 54-60.
    [10] C. Hoong Ding, S. Nutanong, and R. Buyya, “Peer-to-Peer Network for Content Sharing,” Peer-to-Peer Computing: Evolution of a Disruptive Technology, Ramesh Subramanian and Brian Goodman (editors), ISBN: 1-59140-429-0, Idea Group Publisher, Hershey, PPA, USA, 2005, pp. 28-65.
    [11] S. Zander, T. Nguyen, and G. Armitage, “Automated Traffic Classification and Application Identification Using Machine Learning,” The IEEE Conference on Local Computer Networks, Sydney, Australia, 15-17 November 2005, pp. 250-257.
    [12] S. Sen, O. Spatscheck, and D. Wang, “Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures,” ACM Conference on WWW, New York, USA, May 2004, pp. 512-521.
    [13] L. Nandikonda, “Users Should Be Concerned of Spyware in Free P2P Software,” http://www.tml.tkk.fi/Publications/C/18/nandikonda.pdf, 2005.
    [14] IANA, IANA Port Number List, “http://www.iana.org/assignments/port-numbers”.
    [15] Burton H. Bloom, “Space/Time Trade-offs in Hash Coding with Allowable Errors,” Communications of the ACM, vol.13, no.7, July 1970, pp. 422-426.
    [16] A. McGregor, M. Hall, P. Lorier, and J. Brunskill, “Flow Clustering Using Machine Learning Techniques,” Passive and Active Network Measurement, vol. 2015, May 2004, pp. 250-214.
    [17] R. Kwitt, T. Strohmeier, and U. Hofmann, “Machine Learning for Perceptual QoS,” International Conference on Cybernetics and Information Technologies, Systems and Applications, Orlando, Florida, USA, July 2005.
    [18] T. Karagiannis, A. Broido, M. Faloutsos, and K Claffy, “Transport Layer Identification of P2P Traffic,” ACM SIGCOMM Conference on Internet Measurement, Taormina, Sicily, Italy, October 2004, pp. 121-134.
    [19] S. Saroiu, K. P. Gummadi, R. J. Dunn, S. D. Gribble, and H. M. Levy, “An Analysis of Internet Content Delivery Systems,” Symposium on Operating Systems Design and Implementation, Boston, USA, 2002, pp. 315-327.
    [20] S. Sen and J. Wang, “Analyzing Peer-to-Peer Traffic across Large Networks,” IEEE/ACM Transactions on Networking, vol. 12, issue 2, April 2004, pp. 219-232.
    [21] C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, T. Seely, S. C. Diot, “Packet-level Traffic Measurements from the Sprint IP Backbone,” IEEE Network, vol. 17, issue 6, November-December 2003, pp. 6-16.
    [22] C. Dewes, A. Wichmann and A. Feldmann, “An Analysis of Internet Chat Systems,” Internet Measurement Conference 2003 (IMC ’03), FL, USA, 2003, pp. 51-64.
    [23] T. Karagiannis, A. Broido, N. Brownlee, K. C. Claffy, and M. Faloutsosm, “File-Sharing in the Internet: A Characterization of P2P Traffic in the Backbone,” Technical report, http://www.cs.ucr.edu/~tkarag/, 2004.
    [24] K. P. Gummadi, R. J. Dunn, S. Saroiu, S. D. Gribble, H. M. Levy and J. Zahorjan, “Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload,” ACM Symposium on Operation Systems Principles, Bolton Landing, NY, USA, October 2003.
    [25] Jacobus van der Merwe, Ramon Caceres, Yang-hua Chu, Cormac Sreenan, “mmdump: A Tool for Monitoring Internet Multimedia Traffic,” ACM Computer Communication Review, vol. 30, no. 5, 2000.
    [26] Hun-Jeong Kang, Hong-Taek Ju, Myung-Sup Kim, and James W. Hong, “Towards Streaming Media Traffic Monitoring and Analysis,” Asia-Pacific Network Operations and Management (APNOMS 2002), Jeju, Korea, 25-27 September 2002, pp. 503-504.
    [27] Laurent Bernaille and Renata Teixeira, “Early Recognition of Encrypted Applications,” PAM 2007, Louvain-la-Neuve, Belgium, April 5-6, 2007, pp. 165-175.
    [28] Laurent Bernaille, Renata Teixeira and K. Salamatian, “Early Application Identification,” ACM CoNEXT ’06, Lisboa, Portugal, no. 6, 2006.
    [29] Laurent Bernaille, Renata Teixeira and Ismael Akodkenou, “Traffic Classification on The Fly,” Computer Communication Review, vol. 36, no. 2, 2006, pp. 23-26.
    [30] F. Hernandez-Compos, A. B. Nobel, F. D. Smith, and K. Jeffay, “Statistical Clustering of Internet Communication Patterns,” The Symposium on the Interface of Computing Science and Statistics, July 2003.
    [31] M. Roughan, S. Sen, O. Spatscheck, and N. Duffield, “Class-of-Service Mapping for QoS: A Statistical Signature-Based Approach to IP Traffic Classification,” Internet Measurement Conference, 2004, pp. 135-148.
    [32] Myung-Sup Kim, Young J. Won, and James W. Hong, "Characteristic Analysis of Internet Traffic from the Perspective of Flows," Computer Communications, vol. 29, issue 10, 19 June 2006, pp. 1639-1652.
    [33] Denis Zuev and Andrew W. Moore, “Traffic Classification using a Statistical Approach,” International Workshop on Passive and Active Network Measurement, Boston MA, vol. 3431, 31 March-1 April 2005, pp. 321-324.
    [34] Hui Liu, Wenfeng Feng, Yongfeng Huang, and Xing Li, “A Peer-To-Peer Traffic Identification Method Using Machine Learning,” International Conference on Networking, Architecture, and Storage, 2007 (NAS ‘07), 29-31 July 2007, pp. 155-160.
    [35] F. Constantinou and P. Mavrommatis, "Identifying known and unknown peer-to-peer traffic," IEEE International Symposium on Network Computing and Applications (NCA ‘06), 24-26 July 2006, pp. 93-102.
    [36] PPLive, “http://www.pplive.com/”.
    [37] Xiaojun Hei, Chao Liang, Jian Liang, Yong Liu, and Keith W. Ross, “Insights into PPLive: A Measurement Study of a Large-Scale P2P IPTV System,” IPTV Workshop, International World Wide Web Conference, May 2006.
    [38] PPStream, “http://www.ppstream.com/”.
    [39] Jinkang Jia, Chunxi Li, and Changjia Chen, “Characterizing PPStream across Internet,” NPC Workshops, 18-21 September 2007, pp. 413-418.
    [40] TVAnts, “http://www.tvants.com/”.
    [41] T. Silverston, O. Fourmaux, “P2P IPTV Measurement: A Case Study of TVAnts,” ACM CoNEXT, New York, USA, December 2006.
    [42] T. Silverston and O. Fourmaux, “Measuring P2P IPTV Systems,” ACM International Workshop on Network and Operating Systems Support for Digital Audio & Video (NOSSDAV ’07), Urbana, IL, USA, June 2007, pp. 83-88.
    [43] T. Silverston and O. Fourmaux, “P2P IPTV Measurement: A Comparison Study,” http://www.citebase.org/abstract?id=oai:arXiv.org:cs/0610133, October 2006.
    [44] BitComet, “http://www.bitcomet.com/index.htm”.
    [45] IE, “http://www.microsoft.com/windows/products/winfamily/ie/default.mspx”.
    [46] MSN, “http://www.msn.com/”.
    [47] SopCast, “http://www.sopcast.org/”.
    [48] UUSee, “http://www.uusee.com/”.
    [49] FileZilla, “http://filezilla-project.org/”.
    [50] Skype, “http://www.skype.com/”.
    [51] Salman A. Baset and Henning Schulzrinne, “An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol,” IEEE INFOCOM ’06, Barcelina, Spain, April 2006, pp. 1-11.
    [52] K. Suh, D.R. Figueiredo, J. Kurose, and D. Towsley, “Characterizing and Detecting Relayed Traffic: A Case Study using Skype,” IEEE INFOCOM ‘06, Barcelina, Spain, April 2006.
    [53] BitTorrent, “http://www.bittorrent.com/”.
    [54] The BitTorrent Protocol Specification, “http://wiki.theory.org/BitTorrentSpecification/”.
    [55] J. Pouwelse, P. Garbacki, D. Epema, and H. Sips, “The BitTorrent P2P File-Sharing System: Measurements and Analysis,” The IPTPS '05, Ithaca, NY, February 2005, pp. 205-216.
    [56] J.A. Pouwelse, P. Garbacki, D.H.J. Epema, and H.J. Sips, “A Measurement Study of the BitTorrent Peer-to-Peer File-Sharing System,” Technical Report PDS-2004-003, Delft University of Technology, The Netherlands, April 2004.
    [57] eMule, “http://www.emule-project.net/home/perl/general.cgi?l=16”.
    [58] Y. Kulbak and D. Bickson, “The eMule Protocol Specification,“ Technical report, School of Computer Science and Engineering, Hebrew University of Jerusalem, January 2005.
    [59] iMesh, “http://www.imesh.com/”.
    [60] Telnet, “http://en.wikipedia.org/wiki/Telnet”.
    [61] Thunder, “http://www.xunlei.com/”.
    [62] Ares, “http://aresgalaxy.sourceforge.net/”.
    [63] Gnutella, “http://en.wikipedia.org/wiki/Gnutella”.
    [64] SHOUTcast, “http://www.shoutcast.com/”.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE