Title :
Study of P2P flow detection technology
Author :
Zhang, Bo ; Xie, Shimao ; Yan, Xiuli
Author_Institution :
Sch. of Inf. Eng., Southwest Univ. of Sci. & Technol., Mianyang, China
Abstract :
To identify and control P2Pflow more infectively, the industry went through Multi-level explores and put forward many infective P2P flow detection methods. They are the method based on the port, the method based on deep data, the method based on machine learning and the method based on network behavior. In the paper, we sumerize and analyze those methods, and compared both the advantages and disadvantages between them At last, it analyzed the further step of P2P Flow Detection Technology.
Keywords :
learning (artificial intelligence); peer-to-peer computing; P2P flow detection technology; deep data; machine learning; network behavior; port; Feature extraction; Internet; Network topology; Peer to peer computing; Protocols; Servers; Topology; Deep Packet Inspection; Machine Learning; Network behavior; Peer network technology; Port identification;
Conference_Titel :
Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on
Conference_Location :
Yichang
Print_ISBN :
978-1-4577-1414-6
DOI :
10.1109/CECNet.2012.6201808