Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2008, Vol. 31 ›› Issue (2): 95-98.doi: 10.13190/jbupt.200802.95.wangj

• Reports • Previous Articles     Next Articles

A Heuristic Traffic Identification Method Based on Trusted List

WANG Jiao, ZHOU Ya-jian, YANG Yi-xian   

  1. Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2007-07-11 Revised:1900-01-01 Online:2008-04-28 Published:2008-04-28
  • Contact: WANG Jiao

Abstract:

The insufficient of current traffic identification technique was analyzed, and then a heuristic traffic identification method based on trusted list was proposed. This method uses a “memory” technique, adds the discerned connection into a trusted list. Moreover, a real-time optimized method was developed to make sure that the more active connections can be measured to primarily in the trusted list all the time, thus will accelerate the traffic identification speed and improve the accuracy. The experiment results show that this method can identify the encrypted traffic perfectly, and more effectively than existed methods.

Key words: peer-to-peer, traffic identification, trusted list, deep packet inspection

CLC Number: