Font Size: a A A

Campus Network The P2p Protocol Application Data Analysis And Security Research

Posted on:2012-09-05Degree:MasterType:Thesis
Country:ChinaCandidate:S P BaoFull Text:PDF
GTID:2218330338455984Subject:Education Technology
Abstract/Summary:PDF Full Text Request
Along with our state attach importance to the information technology in education and the development of computer networks, most of schools in our country have built a campus networks, in addition to the traditional WEB,FTP,E-MAIL applications, there are a lot of the QQ, Thunder and other software representative P2P application in our campus network. The rapid growth of P2P applications so that students and teachers brought in to enjoy their "speed" and "service", but also brought large amounts of bandwidth occupied by P2P applications, virus transmission and other issues affecting education, the availability of critical applications and educational resources to complete and so on. In order to provide security, stability, the campus network to enhance the ability of information technology education in schools, the need for effective identification and management of P2P applications, give full play to its strengths and overcome its weaknesses.In this paper, I analyzes the development of P2P, the network structure of P2P and discuss the similarities and differences of traditional C/S network, divide the P2P applications in campus network into sharing, real-time interaction, campus-demand, digital information resources, organizations, campus monitoring according to use. And example by the most commonly used in real-time interactive software QQ, using wireshark software to capture packets, then detailed analysis of the application data. Analysis showed that application of P2P protocols exist in the Campus Network copyright issues, problems and viruses and worms, and other bandwidth-intensive, but it can also be a distributed denial of service attack defense (DDOS attack). In order to effectively overcome the existing campus network P2P application security issues, analysis of cryptographic techniques, authentication, traffic identification of these three security technology. The bandwidth-intensive of education-critical applications availability is P2P applications are the main security problems, so need to accurately identify P2P traffic, on and teaching independent P2P applications to manage, this article analyzes the common P2P traffic identification method, and use wireshark packet capture software, according to various recognition technology to identify QQ traffic, and in the final statistical and analysis of the intelligent seven common P2P traffic identification and management tools.
Keywords/Search Tags:P2P application in campus network, data analysis, security issues, traffic identification
PDF Full Text Request
Related items