Research of P2P Traffic Real-Time Monitoring Technology Based on DPI

Article Preview

Abstract:

As the P2P technology brings an abundance of network shared resources and information services, P2P technology also brings a lot of bandwidth, intellectual property, information security problems. Against the problems, and studying technologies of P2P traffic flow monitoring, the paper presents an improved P2P traffic monitoring method based on advantages and disadvantages of current P2P flow monitoring methods. According to the test results, the system achieved well in the demand of control P2P traffic.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

451-455

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] L. F. Zhang, N. A. Liu, X. B. Qian, Y. Q. Zhang (2003) Summarize: P2P Technology Computer Engineering and Applications 1(1): 20-27.

Google Scholar

[2] Karl Aberer (2003) Philippe Cadre-Mau roux Manfred Hemsworth. Start making sense: The Chatty Web approach for 405 global semantic agreements. Journal of Web Semantics 2(1): 89-114.

DOI: 10.1016/j.websem.2003.09.001

Google Scholar

[3] Q. Wang (2004) the challenge of new P2P technology to the traditional copyright indirect infringement Electronics Intellectual Property 3(8): 114-118.

Google Scholar

[4] Q. Zhang (2005) The international content security and protection discussion Network Security Technology & Application 4(2): 119-123.

Google Scholar

[5] SEN S, WANG J(2004)Analyzing peer-to-peer traffic across large networks IEEE/ACM Transaction On Networking 5(2): 219-232.

DOI: 10.1109/tnet.2004.826277

Google Scholar