【24h】

STUDY OF ENCRYPTED AND NON-ENCRYPTED BITTORRENT TRAFFIC

机译:加密的和非加密的恶意流量研究

获取原文
获取原文并翻译 | 示例

摘要

Over recent years, Peer to Peer (P2P) traffic over thernInternet has increased dramatically. P2P file sharingrnapplications, such as Napster, Gnutella, KaZaA,rnBitTorrent, Skype and PPLive, have experiencedrntremendous success among end users. Recent statisticsrnsuggests that P2P traffic accounts towards 70% of Internetrntraffic. P2P traffic becomes a major concern for InternetrnService Provider (ISP). Some ISPs have implementedrnshaping or blocking techniques in order to stem the flowrnof P2P traffic over their networks, which not only affectrnend users, but also the companies who develop P2Prnapplications. Although P2P protocols can be used forrntransferring illegal content they have great potential forrnlegitimate users, especially those in the business world. Inrnthis paper, we examine both encrypted and non-encryptedrnnetwork traffic from BitTorrent, one of the most popularrnP2P protocols. First hardware and software requirementsrnfor this study are described. Secondly a torrent’s life cyclernand data capture from the Internet are explained. Thenrnencrypted and non-encrypted traffic are compared andrnanalysed. Our investigations show that P2P is almostrnimpossible to hide as not every packet is encrypted in thernencrypted stream.
机译:近年来,互联网上的点对点(P2P)流量已急剧增加。 P2P文件共享应用程序(例如Napster,Gnutella,KaZaA,BitTorrent,Skype和PPLive)在最终用户中获得了巨大的成功。最近的统计数据表明,P2P流量占Internet流量的70%。 P2P流量已成为Internet服务提供商(ISP)的主要问题。一些ISP已实施了整形或阻止技术,以阻止流向其网络的P2P流量,这不仅影响最终用户,还影响开发P2Prn应用程序的公司。尽管可以使用P2P协议来传输非法内容,但P2P协议具有极大的潜在合法用户,尤其是商业领域的合法用户。在本文中,我们检查了来自BitTorrent(最流行的P2P协议之一)的加密和非加密网络流量。首先介绍了这项研究的硬件和软件要求。其次,解释了洪流的生命周期以及从Internet捕获数据的过程。然后对加密和非加密流量进行比较和分析。我们的研究表明,几乎没有隐藏P2P的可能,因为并非每个数据包都在加密流中被加密。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号