DocumentCode
2121950
Title
Study of P2P flow detection technology
Author
Zhang, Bo ; Xie, Shimao ; Yan, Xiuli
Author_Institution
Sch. of Inf. Eng., Southwest Univ. of Sci. & Technol., Mianyang, China
fYear
2012
fDate
21-23 April 2012
Firstpage
2106
Lastpage
2110
Abstract
To identify and control P2Pflow more infectively, the industry went through Multi-level explores and put forward many infective P2P flow detection methods. They are the method based on the port, the method based on deep data, the method based on machine learning and the method based on network behavior. In the paper, we sumerize and analyze those methods, and compared both the advantages and disadvantages between them At last, it analyzed the further step of P2P Flow Detection Technology.
Keywords
learning (artificial intelligence); peer-to-peer computing; P2P flow detection technology; deep data; machine learning; network behavior; port; Feature extraction; Internet; Network topology; Peer to peer computing; Protocols; Servers; Topology; Deep Packet Inspection; Machine Learning; Network behavior; Peer network technology; Port identification;
fLanguage
English
Publisher
ieee
Conference_Titel
Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on
Conference_Location
Yichang
Print_ISBN
978-1-4577-1414-6
Type
conf
DOI
10.1109/CECNet.2012.6201808
Filename
6201808
Link To Document