P2P流媒体识别方法的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着P2P技术应用的不断扩展,特别是文件共享和流媒体业务不断壮大,P2P网络本身潜在的安全问题和对各种资源,特别是带宽资源的滥用,已经受到各个网络运营商的高度重视。因此,实现分类、标识和控制P2P流量越来越成为企业、网络运营商急需解决的问题。目前,对P2P应用流量的识别与检测已形成了成熟产品的技术主要是基于深层数据包特征码匹配。任何基于程序性固定特征匹配的识别方法随着软件的更新或加密而极易失效,只有能体现应用流量本质的行为模式识别才是最终解决办法。但目前针对P2P流媒体流量行为特征的研究却几乎没有,而其应用软件的更新及流行速度却远较其它类型的P2P软件要迅速和广泛得多,从而使原本在P2P网络中就已出现的安全及盗版问题变得更加严重和难以控制。因此必须开展基于P2P流媒体流量行为特征模式的识别技术研究,以实现对未知应用和加密后流量的识别,这是具有非常重要理论意义和实用价值的研究。
     根据大量相关性研究结论和对P2P系统网络各种特征的分析,对P2P网络本质特征研究表明:P2P系统的网络区别于其它系统最本质的特征在于它的动态特性,并提出可将P2P网络的各种动态特征归纳为节点扰动和资源暂存两个方面的分类观点。
     从节点扰动性的角度研究适用于各类型P2P流量的识别算法CSI。由于发现P2P网络中节点扰动会引起随机访问节点时成功建立连接概率较低的现象。CSI算法通过计算一段时间间隔内单节点向外发出连接请求且连接成功的概率,并使用核密度估计方法对计算出的概率序列进行数值分布规律及时间变化趋势分析,然后根据分析结果对流量加以识别。由节点在线时间概率分布模型推导出网络中已有节点的继续存活时间的概率分布模型。由该模型,对集中式和DHT结构式两种典型架构的P2P网络任意节点访问成功概率的研究表明由于规模巨大和节点扰动,在这两种类型网络中都难以实现较高的成功率。此结论为CSI算法的建立提供了很好的理论证明。具体流量识别实验也证明CSI算法能很好的适用于各种类型的P2P流量。
     根据对P2P流媒体流量具有两层性特点(P2P特征+流媒体应用导致的新特征)的分析,提出一种对流媒体流量先进行P2P特征识别,再对识别出的P2P流量进行流媒体特征识别的层次识别模型。这种层次识别思路简化了识别算法的设计,且能大大减轻识别开销。
     P2P直播系统网络具有资源暂存性极大的特点,因此通过计算节点的平均BM信息比可有效的实现其流量的识别,算法IRI正是基于此方法提出的。流媒体传输和播放需要有严格的实时性、时序性以及连续性的特点使直播系统具有了高频度周期性的信息交换以及下载调度的机制,以此来实现节点间最大限度的资源共享。直播节点会通过频繁交换资源结构信息(Buffer Map)来克服资源快速过期引起的资源访问失败。由此提出P2P直播流量应具有BM信息包高频传输的特征并提出相应的测量模型。进一步通过对节点资源的存活时间建立概率分布模型,推导出可用于识别直播流量的阈值。实际实验的结果也证明了IRI算法具有漏判率很低,而误判率略高的特点,结合对流速大小和流波形平稳度的考量后可有效地消除误判。
     同样可从资源暂存性的角度对另一种P2P流媒体应用的流量—点播的识别算法展开研究。由于P2P点播系统中的资源暂存性和实时顺序播放的要求,导致其频繁周期性调度下载机制没有改变,由此一种通过测量节点的断点调度一致性来进行流量识别的算法BSI被提出。由于硬盘存储和CDN服务器的加入,点播系统的节点资源暂存性较直播系统有所改善,但仍为其重要特征之一。加上流媒体传输的实时连续性要求,直播系统中频繁周期性的调度下载机制并没有改变,但相对周期增大,因此针对直播流量的识别技术不再适合点播。而点播系统对高交互性操作的要求,使得周期内下载从直播的固定一次调度模式变为可多次随机调度的机动模式,系统以此提高下载的反应速度。而频繁周期性下载会造成数据流传输过程中的断流现象,对于流媒体系统,断流后数据的继续传输几乎都是由调度下载的行为引起的。而点播系统的灵活调度模式使得它的调度行为变得比直播系统中的要更为明显和易于测量(调度控制包的负载较大)。相应测量模型和阈值被提出,并通过最大熵方法对阈值的可用性进行证明。实验结果证明BSI算法不仅适用于点播流量,对直播流量也同样有良好的识别效率。
With the growing popularity of the P2P technology, especially the expansion of file-sharing and streaming applications, the potential security threats posed by P2P technologies and the resource abuse by P2P applications concern Internet Service Providers (ISPs). For traffic-specific network engineering, ISPs must be able to classify Internet traffic, which highlights the need for P2P traffic detection. At present, commercial products for identifying P2P traffic are mainly based on application-layer signature matching. Any approach based on software-special characteristic matching will easily become useless along with software renewal or while payloads are encrypted, and can keep never outdated only according to nature-behavior patterns. To this day, there is none of studies on behavior patterns of P2P-streaming peer while the application spreads and softwares are evolving more rapidly than others, it makes the problems of security and copyright infringement more severe and uncontrollable than other systems. It is important and worthy of challenging for the Internet research community to acquire an in-depth understanding of the delivery of P2P streaming, particularly for the delivery architectures that hold the greatest promise for broad deployment in the near future so that the knowledge can be used to detect any unknown or encrypted traffic.
     Supported by many related works and the analysis of main characteristics of P2P system , a conclusion can be gained that dynamic behavior characterics, in theory, the dynamic nature of a P2P system distinguishes it from any traditional systems. As far as we know, it is the first time all dynamic characters of P2P system are reduced to two aspects: churn of peers and resource evanescence.
     From the perspective of peers churn an identification algorithm applied to all types of P2P traffic is presented. In P2P network , the dynamics of peer participation will cause low probability of success of connection establishment when peers are accessed randomly. Based on it, CSI algorithm is proposed which can identify a P2P peer by calculating the its success probability to contact with other peers within a period of time, and then analyzing the probability serial calculated in time order with Kernel Density Estimation aiding in understanding the most potential value of probability. Armed with the churn model and the joint lifetime distribution of the users of P2P system, the residual lifetime distribution of a randomly selected alive peer in the network is obtained. The contact-success probability of peers in structured P2P systems using distributed hash tables,also in centralized systems, is calculated according to the residual lifetime distribution. Both the not-so-high results consolidate the idea that is impossible for P2P system to make every connecting between peers successful due to large-scale network and churn. And the results of experiments also conform the effectiveness of CSI.
     The theory that P2P streaming traffic can be charactered in two levels: P2P and streaming media. It conducts a two-level traffic classification model of P2P streaming which filters all traffic with P2P-level characters and then identifying streaming traffic within the P2P traffic filtered in the first step . That is obvious this model can reach good performance for its simpleness and small-cost.
     As resources in P2P live network with very temporary nature, so through the average percentage of BM information receiving a live peer can be detected effectively, and IRI algorithm is proposed. Since the transmission of streaming media both need a high standard of real-time, as well as the timing of the continuity, so that the P2P live system deploys a high-frequent and cyclical download scheduling and information exchange mechanisms to achieve the inter-peer maximum resource sharing. Through the frequent exchange of structure of resources in their buffer , live peers can overcome the failures caused by the rapid rise of expired resources. From this, a character that Buffer Map informations should be transmitted continually in live traffic is revealed and followed by the measurement model of it. Further, the residual lifetime distribution of any randomly selected resource in peer' s buffer is derived which can be used to deduce a threshold of the identification of live traffic . The actual results of experiments show that IRI algorithm has a very small rate of missing detection, and samely a slightly higher rate of mistaken detection which can be effectively eliminated by IRI combined with the considerations of the bit rate and waveform of flow .
     Similarly, from the perspective of resource evanescence the research of the flow-based traffic detection techniques of the other application—media-on-demand(MoD) can be conducted . As a result of resource evanescence and the requirement for real-time and smooth playback, the frequent periodic scheduling mechanism to download must be needed by P2P-based MoD systems. BSI algorithm is proposed which classifies traffic into MoD and no-MoD by measuring the consistency of scheduling at breakpoints in the downloading process of a peer. As hard disk-storage and CDN servers are deployed in MoD systems, resources stay for a longer time than live system, but resource evanescence still is one of the most important characters. In addition to this, the requirement for real-time and continuity playback, the download scheduling and information exchange mechanisms also keep frequent as live system ,however, with a relative increasing cycle, so the detecting technology for live traffic is no longer suitable. In MoD system, the demand for high interactive operations with users makes the downloading mode within a period from one-time-scheduling of live system to multiple-random-scheduling through which peers can be responded more rapidly. The frequent and periodic mode of downloading is the key reason for considerable breakpionts in the process of data transmission. Data transmission following every breakpoint almost is triggered by scheduling which is more easily to measure than live system with bigger-payload packets to instruct downloading. The correspoding measurement model is proposd ,also with the threshold for classification whose effectiveness proved by Maximum Entrop Method. Experimental results show that BSI algorithm is not only applicable to MoD but also live traffic.
引文
[1] Karagiannis, T., et al. Is P2P dying or just hiding? [P2P traffic measurement. in Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE. 2004. Dallas, TX, USA: IEEE, 2004,1533: 1532-1538
    [2] Schollmeier, R. and G. Schollmeier. Why peer-to-peer (P2P) does scale: an analysis of P2P traffic patterns. in Peer-to-Peer Computing, 2002. (P2P 2002). Proceedings. Second International Conference on. 2002. Linkoping, Sweden: IEEE Comput. Soc, 2002: 112-119
    [3] Jung-Tae, K., P. Hae-Kyeong, and P. Eui-Hyun. Security issues in peer-to-peer systems. in Advanced Communication Technology, 2005, ICACT 2005. The 7th International Conference on. 2005. Phoenix Park, South Korea: IEEE, 2005: 1059-1063
    [4] Wei, Y., et al. Peer-to-peer system-based active worm attacks: modeling and analysis. in Communications, 2005. ICC 2005. 2005 IEEE International Conference on. 2005. Seoul, South Korea: Institute of Electrical and Electronics Engineers Inc., Piscataway, NJ 08855-1331, United States. 2005: 295-300
    [5] Hwang, K. Recent Advances in Trusted Grids and Peer-to-Peer Computing Systems. in Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International. 2007. Long Beach, CA, USA: IEEE, 2007: 1-1
    [6] Li, X. and X. Gui. engineering trusted P2P system with fast reputation aggregating mechanism. in Robotics and Biomimetics, 2007. ROBIO 2007. IEEE International Conference on. 2007. Yalong Bay, Sanya, China: Institute of Electrical and Electronics Engineers Computer Society, Piscataway, NJ 08855-1331, United States, 2007: 2007-2012
    [7] Park, J. S., G. An, and D. Chandra. Trusted P2P computing environments with role-based access control. Information Security, IET, 2007,1(1): 27-35
    [8] Shakkottai, S. and R. Srikant. Peer to Peer Networks for Defense Against Internet Worms.Selected Areas in Communications.IEEE Journal on,2007,25(9):1745-1752
    [9]Datta,A.,M.Hauswirth,and K.Aberer.Beyond "Web of trust":enabling P2P e-commerce,in E-Commerce,2003.CEC 2003.IEEE International Conference on.2003.Newport Beach,CA,USA:IEEE Comput.Soc.,2003:303-312
    [10]Lichun,J.and R.Deters.Coordination and enterprise wide P2P computing,in Services Computing,2005 IEEE International Conference on.2005.Orlando,FL,USA:IEEE Computer Society,2005,142:141-148
    [11]龚海刚,刘明,毛莺池.P2P流媒体关键技术的研究进展.计算机研究与发展,2005,42(12):2033-2040
    [12]艾瑞市场咨询有限公司.艾瑞P2P流媒体类软件月度分析报告.Available from:http://www.iresearch.com.cn,2006 12
    [13]Yanfeng,Y.,et al.Traffic Identification and Overlay Measurement of Skype.in Computational Intelligence and Security,2006 International Conference on.2006.Guangzhou,China:Institute of Electrical and Electronics Engineers Computer Society,Piscataway,NJ 08855-1331,United States,2006:1043-1048
    [14]Bonfiglio,D.,et al.Revealing skype traffic:when randomness plays with you.SIGCOMM Comput.Commun.Rev.,2007,37(4):37-48
    [15]Rossi,D.,M.Mellia,and M.Meo.Following Skype signaling footsteps.2008 4th International Telecommunication Networking Workshop on Qos in Multiservice Ip Networks.2008,New York:Ieee,2008:248-253
    [16]Han,Y.and H.Park,Distinctive traffic characteristics of pure and game P2P applications.10th International Conference on Advanced Communication Technology,Vols I-Iii - Innovations toward Future Networks and Services,2008,Piscataway:Ieee,2008:405-408
    [17]雷蕾,沈富可.基于连接特征的P2P流媒体应用的识别.计算机应用,2007.12:41-43
    [18]Madhukar,A.and C.Williamson.A Longitudinal Study of P2P Traffic Classification.in Modeling,Analysis,and Simulation of Computer and Telecommunication Systems,2006.MASCOTS 2006.14th IEEE International Symposium on,2006:179-188
    [19]王逸欣.P2P流量检测技术初探.计算机与数字工程,2006,34(6):161-164
    [20]李君.P2P业务流量识别、分析和控制研究.计算机工程,2006,32(11):122-124
    [21]陆庆.对等网络流量检测技术.电子科技大学学报,2007,36(6):1333-1337
    [22]石萍.基于对等特征的P 2 P流量识别方法.网络测量与规划,2007(2):36-38
    [23]Dedinski,I.,et al.,Cross-Layer Peer-to-Peer Traffic Identification and Optimization Based on Active Networking.Proceedings of the Seventh Annual International Working Conference on Active and Programmable Networks (IWAN'05),2005
    [24]Sen,S.and W.Jia,Analyzing peer-to-peer traffic across large networks.Networking,IEEE/ACM Transactions on,2004,12(2):219-232
    [25]Dae-Hee,K.,et al.Identification of P2P Traffic SET-based in Broadband Convergence Network.in Optical Internet and Next Generation Network,2006.COIN-NGNCON 2006.The Joint International Conference on.2006.Jeju,South Korea:IEEE,2006:72-74
    [26]Constantinou,F.and P.Mavrommatis.Identifying Known and Unknown Peer-to-Peer Traffic.in Network Computing and Applications,2006.NCA 2006.Fifth IEEE International Symposium on.2006.Cambridge,MA,USA:IEEE Comput.Soc.,2006:93-102
    [27]Karagiannis,T.,et al.Transport layer identification of P2P traffic.2004.Taormina,Italy:Association for Computing Machinery,New York,NY 10036-5701,United States,2004:121-134
    [28]Bolla,R.,et al.Characterizing the network behavior of P2P traffic,in Telecommunication Networking Workshop on QoS in Multiservice IP Networks,2008.IT-NEWS 2008.4th International.2008.Venice,Italy:Institute of Electrical and Electronics Engineers Computer Society,Piscataway,NJ 08855-1331,United States,2008:14-19
    [29] Erman, J., M. Arlitt, and A. Mahanti, Traffic classification using clustering algorithms Proceedings of the 2006 SIGCOMM workshop - Mining network data, 2006: 281-286
    [30] Divakaran, D. M., H. A. Murthy, and T. A. Gonsalves, Traffic modeling and classification using packet train length and packet train size, in Autonomic Principles of Ip Operations and Management, Proceedings, 2006: 1-12
    [31] Junior, G. P. S., et al. P2P Traffic Identification using Cluster Analysis. in Global Information Infrastructure Symposium, 2007. GIIS 2007. First International. 2007. Marrakech, Morocco: IEEE, 2007: 128-133
    [32] Wang, J., et al. Connection Pattern-Based P2P Application Identification Characteristic. in Network and Parallel Computing Workshops, 2007. NPC Workshops. IFIP International Conference on. 2007. Dalian, China: Institute of Electrical and Electronics Engineers Computer Society, Piscataway, NJ 08855-1331, United States. 2007: 437-441
    [33] Yue-xiang, Y., et al. Solving P2P Traffic Identification Problems Via Optimized Support Vector Machines. in Computer Systems and Applications, 2007. AICCSA '07. IEEE/ACS International Conference on. 2007. Jinan, China: IEEE Computer Society, 2007: 165-171
    [34] Li, J., et al. Internet Traffic Classification Using Machine Learning. in Communications and Networking in China, 2007. CHINACOM '07. Second International Conference on. 2007. Shanghai, China: IEEE, 2007: 239-243
    [35] Xu, P., Q. Liu, and S. Lin. Improved transport layer identification of peer-to-peer traffic. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2008, 45(5): 794-802
    [36] Tauriainen, A., A Self-learning System for P2P Traffic Classification. Seminar on Internetworking, 2005(4): 26-27
    [37] Kattirtzis, C., et al. Analyzing traffic across the Greek School Network. in Local and Metropolitan Area Networks, 2005. LANMAN 2005. The 14th IEEE Workshop on. 2005. Crete, Greece: IEEE, 2005: 6
    [38] Kin Wah, K. and D. H. K. Tsang. On the relationship of node capacity distribution and P2P topology formation. in High Performance Switching and Routing, 2005. HPSR. 2005 Workshop on. 2005. Hong Kong, China: IEEE, 2005: 123-127
    [39] Saleh, O. and M. Hefeeda. Modeling and Caching of Peer-to-Peer Traffic. in Network Protocols, 2006. ICNP '06. Proceedings of the 2006 14th IEEE International Conference on. 2006. Santa Barbara, CA, United States: IEEE Computer Society, Los Alamitos, CA 90720-1314, United States,.2006: 249-258
    [40] Li-Juan, Z., L. Zhi-Tang, and H. Tu. Proposition and Provement of A TCP Feature of P2P Traffic- An Example of BitTorrent and Emule. in Communications and Networking in China, 2007. CHINACOM '07. Second International Conference on. 2007. Shanghai, China: Institute of Electrical and Electronics Engineers Inc., Piscataway, NJ 08855-1331, United States, 2007: 61-65
    [41] Hamada, T., et al. Peer-to-peer traffic in metro networks: analysis, modeling, and policies. in Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP. 2004. Seoul, South Korea: IEEE, 2004, 421: 425-438
    [42] Erman, D., D. Ilie, and A. Popescu. BitTorrent Traffic Characteristics. in Computing in the Global Information Technology, 2006. ICCGI '06. International Multi-Conference on, 2006: 42-42
    [43] Holger, B., P. R. Erwin, and Z. Stefan. Advanced P2P Multiprotocol Traffic Analysis Based on Application Level Signature Detection. in Telecommunications Network Strategy and Planning Symposium, 2006. NETWORKS 2006. 12th International. 2006. New Delhi, India: Institute of Electrical and Electronics Engineers Inc., Piscataway, NJ 08855-1331, United States, 2006: 1-6
    [44] Mong-Fong, H., et al. Identification and Analysis of P2P Traffic- An Example of BitTorrent. in Innovative Computing, Information and Control, 2006. ICICIC '06. First International Conference on. 2006. Beijing, China: IEEE Comput. Soc, 2006: 266-269
    [45] He, G., et al. One Size Does Not Fit All: A Detailed Analysis and Modeling of P2P Traffic. in Global Telecommunications Conference, 2007. GLOBECOM '07. IEEE. 2007:393-398
    [46]於建华,徐艳萍,吴素芹.基于流传输特性的P2P流量识别方法研究.通信技术,2007,40(11):247-249
    [47]Spognardi,A.,A.Lucarelli,and R.Di Pietro.A methodology for P2P file-sharing traffic detection.2005.San Diego,CA,USA:IEEE Computer Society,2005:52-61
    [48]Holger,B.,P.R.Erwin,and Z.Stefan.Evaluation of an Efficient Measurement Concept for P2P Multiprotocol Traffic Analysis.in Software Engineering and Advanced Applications,2006.SEAA '06.32nd EUROMICRO Conference on.2006.Cavtat,Dubrovnik,Croatia:IEEE Comput.Soc.,2006:414-423
    [49]Bleul,H.and E.P.Rathgeb,A simple,efficient and flexible approach to measure multi-protocol peer-to-peer traffic,in Networking -Icn 2005,Pt 2.2005,Springer-Verlag Berlin:Berlin,2005:606-616
    [50]Li,M.-w.,et al.,Technology for identifying BT traffic based on payload analysis.Journal of Computer Applications,2007,27(9):2230-2232
    [51]刘刚.BitTorrent流量的捕获方法及自相似性的评价.计算机应用研究,2005(5):205-209
    [52]韦安明.高速网络中P2P流量检测及控制方法.北京邮电大学学报,2007,30(5):117-120
    [53]Schmidt,S.E.G.and M.Soysal.An intrusion detection based approach for the scalable detection of P2P traffic in the national academic network backbone,in Computer Networks,2006 International Symposium on.2006.Istanbul,Turkey:Institute of Electrical and Electronics Engineers Computer Society,Piscataway,NJ 08855-1331,United States,2006:128-133
    [54]Zhenxiang,C.,et al.A Novel Method of P2P Hosts Detection Based on Flexible Neural Tree.in Intelligent Systems Design and Applications,2006.ISDA '06.Sixth International Conference on.2006.Jinan,China:Institute of Electrical and Electronics Engineers Computer Society,Piscataway,NJ 08855-1331,United States,2006:556-561
    [55]Lloret,J.,et al.Public Domain P2P File-Sharing Networks Measurements and Modeling.in Internet Surveillance and Protection,2006.ICISP '06.International Conference on.2006.Cote d'Azur,France:Institute of Electrical and Electronics Engineers Computer Society,Piscataway,NJ 08855-1331,United States,2006:10-10
    [56]Leonard,D.,et al.,On Lifetime-Based Node Failure and Stochastic Resilience of Decentralized Peer-to-Peer Networks.Networking,IEEE/ACM Transactions on,2007,15(3):644-656
    [57]Matsuda,T.,et al.Traffic Features Fit for P2P Discrimination.in Information and Telecommunication Technologies,2005.APSITT 2005 Proceedings.6th Asia-Pacific Symposium on.2005.Yangon,Myanmar:Institute of Electrical and Electronics Engineers Computer Society,Piscataway,NJ 08855-1331,United States,2005:230-235
    [58]Aggarwal,V.,et al.Reflecting P2P User Behaviour Models in a Simulation Environment.in Parallel,Distributed and Network-Based Processing,2008.PDP 2008.16th Euromicro Conference on.2008.Toulouse,France:IEEE,2008:516-523
    [59]柳斌,李之棠,李佳.一种基于流特征的P2P流量实时识别方法.厦门大学学报,2007,46(2):133-135
    [60]Xing,L.,D.Haixin,and L.Xing.Identification of P2P traffic based on the content redistribution characteristic,in Communications and Information Technologies,2007.ISCIT '07.International Symposium on.2007.Sydney,Australia:Institute of Electrical and Electronics Engineers Computer Society,Piscataway,NJ 08855-1331,United States,2007:596-601
    [61]Cheng,W.Q.,J.Gong,and W.Ding.Identifying BT-like P2P Traffic by the Discreteness of Remote Hosts.in Local Computer Networks,2007.LCN 2007.32nd IEEE Conference on.2007.Dublin,Ireland:IEEE Computer Society,Los Alamitos,CA 90720-1314,United States,2007:237-238
    [62]Bartlett,G.,J.Heidemann,and C.Papadopoulos.Inherent Behaviors for On-line Detection of Peer-to-Peer File Sharing. in IEEE Global Internet Symposium, 2007. 2007. Anchorage, AK, United States: Institute of Electrical and Electronics Engineers Computer Society, Piscataway, NJ 08855-1331, United States, 2007: 55-60
    [63] Zhou, L., Z. Li, and B. Liu. P2P traffic identification by TCP flow analysis. 2006. Shenyang, China: Institute of Electrical and Electronics Engineers Computer Society, Piscataway, United States, 2006: 47-48
    [64] Moore, A. W. and D. Zuev. Internet traffic classification using bayesian analysis techniques. 2005. Banff, AB, Canada: Association for Computing Machinery, New York, NY 10036-5701, United States, 2005: 50-60
    [65] Jun, L., et al. Active P2P Traffic Identification Technique. in Computational Intelligence and Security, 2007 International Conference on. 2007. Harbin, China: IEEE, 2007: 37-41
    [66] Deshpande, M. and N. Venkatasubramanian. The different dimensions of dynamicity. in Peer-to-Peer Computing, 2004. Proceedings. Proceedings. Fourth International Conference on. 2004. Zurich, Switzerland: IEEE Comput. Soc, 2004: 244-251
    
    [67] Jing Tian and Y. Dai, Understanding the Dynamic of P2P Systems. IPTPS, 2007
    [68] Li, C. X. and C. J. Chen, On Gnutella topology dynamics by studying leaf and ultra connection jointly in phase space. Computer Networks, 2008, 52(3): 695-719
    [69] Ohzahata, S. and K. Kawashima. A Study on Traffic Characteristics Evaluation for a Pure P2P Application. in Parallel, Distributed and Network-Based Processing, 2008. PDP 2008. 16th Euromicro Conference on. 2008. Toulouse, France: IEEE, 2008: 483-490
    
    [70] Ho, K., J. Wu, and J. Sum, On the session lifetime distribution of Gnutella. International Journal of Parallel, Emergent and Distributed Systems, 2008, 23(1): 1-15
    [71] Adler, M., et al. Optimal peer selection for P2P downloading and streaming. in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies.Proceedings IEEE.2005.Miami,FL,United States:nstitute of Electrical and Electronics Engineers Inc.,Piscataway,NJ 08855-1331,United States,.2005,1533:1538-1549
    [72]Hulsen,P.,E.Vlemmix,and K.Baker.Peer-to-peer Internet television,in Automated Production of Cross Media Content for Multi-Channel Distribution,2005.AXMEDIS 2005.First International Conference on.2005.Florence,Italy:IEEE Computer Society,2005:4
    [73]Jinkang,J.,C.Changjia,and L.Chunxi.Preferential Attachment Topology Formation of the P2P IPTV System.in Innovative Computing,Information and Control,2007.ICICIC '07.Second International Conference on.2007.Kumamoto,Japan:IEEE Computer Society,2007:545-545
    [74]Kumar,R.,L.Yong,and K.Ross.Stochastic Fluid Theory for P2P Streaming Systems.in INFOCOM 2007.26th IEEE International Conference on Computer Communications.IEEE.2007.Anchorage,AK,USA:IEEE,2007:919-927
    [75]Rongtao,L.,Y.Shengsheng,and D.Lijun.A novel peer management model for live peer-to-peer streaming,in Intelligent Signal Processing and Communication Systems,2007.ISPACS 2007.International Symposium on.2007.Xiamen,China:Institute of Electrical and Electronics Engineers Inc.,Piscataway,NJ 08855-1331,United States,2007:538-541
    [76]Susu,X.,et al.,Coolstreaming:Design,Theory,and Practice.Multimedia.IEEE Transactions on,2007,9(8):1661-1671
    [77]Chao,L.,G.Yang,and L.Yong.Hierarchically Clustered P2P Streaming System.in Global Telecommunications Conference,2007.GLOBECOM '07.IEEE.2007.Washington,DC,USA:IEEE,2007:236-241
    [78]刘亚杰,王晖,郭波.P2P流媒体数据调度研究综述.计算机应用,2008,28(4):829-831
    [79]Chuan,W.,L.Baochun,and Z.Shuqiao,Characterizing Peer-to-Peer Streaming Flows.Selected Areas in Communications.IEEE Journal on,2007,25(9):1612-1626
    [80]Jinkang,J.,L.Chunxi,and C.Changjia.Characterizing PPStream across Internet.in Network and Parallel Computing Workshops,2007.NPC Workshops.IFIP International Conference on.2007.Liaoning,China:IEEE,2007:413-418
    [81]Yipeng,Z.,C.Dah Ming,and J.C.S.Lui.A Simple Model for Analyzing P2P Streaming Protocols.in Network Protocols,2007.ICNP 2007.IEEE International Conference on.2007.Beijing,China:IEEE,2007:226-235
    [82]Xiaojun,H.,et al.A Measurement Study of a Large-Scale P2P IPTV System.Multimedia,IEEE Transactions on,2007,9(8):1672-1687
    [83]Kumar,P.,G.Sridhar,and V.Sridhar.Bandwidth and latency model for DHT based peer-to-peer networks under variable churn.in Systems Communications,2005.Proceedings.2005.Montreal,Que.,Canada:IEEE Comput.Soc.,2005:320-325
    [84]Binzenhofer,A.,G.Kunzmann,and R.Henjes,Design and analysis of a scalable algorithm to monitor chord-based p2p systems at runtime.Concurrency and Computation-Practice & Experience,2008,20(6):625-641
    [85]刘琼.Peer-to-Peer文件共享系统的测量研究.软件学报,2006,17(10):2131-2140
    [86]Manini,D.,R.Gaeta,and M.Sereno.Performance Modeling of P2P File Sharing Applications.in Techniques,Methodologies and Tools for Performance Evaluation of Complex Systems,2005.(FIRB-Perf 2005).2005 Workshop on.2005.Torino,Italy:Institute of Electrical and Electronics Engineers Computer Society,Piscataway,NJ 08855-1331,United States,2005:34-43
    [87]Ying,L.,et al.Stochastic fluid model for P2P content distribution networks,in Autonomous Decentralized Systems,2005.ISADS 2005.Proceedings.2005.Chengdu,Jiuzhaigou,China:IEEE,2005:707-712
    [88]Wierzbicki,A.,et al.Cache replacement policies revisited:the case of P2P traffic.in Cluster Computing and the Grid,2004.CCGrid 2004.IEEE International Symposium on.2004.Chicago,IL,United States:Institute of Electrical and Electronics Engineers Inc.,New York,NY 10016-5997,United States,2004: 182-189
    [89] Kong, J. S., J. S. A. Bridgewater, and V. P. Roychowdhury, Resilience of structured P2P systems under churn: The reachable component method. Computer Communications, 2008, 31(10): 2109-2123
    [90] Zhongmei, Y., et al. Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks. in Network Protocols, 2006. ICNP '06. Proceedings of the 2006 14th IEEE International Conference on. 2006. Santa Barbara, CA, United States: IEEE Computer Society, Los Alamitos, CA 90720-1314, United States, 2006: 32-41
    [91] Tian, J., et al. Understanding the session durability in peer-to-peer storage system. 2006. Reading, United Kingdom: Springer Verlag, Heidelberg, D-69121, Germany, 2006: 428-435
    [92] Bonifati, A., et al., Distributed databases and peer-to-peer databases: Past and present. Sigmod Record, 2008, 37(1): 5-11
    [93] Krishna Gummadi, P., S. Saroiu, and S. D. Gribble, A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems. Computer Communication Review, 2002, 32(1): 82
    [94] Leonard, D., et al. On static and dynamic partitioning behavior of large-scale networks. in 13th IEEE International Conference on Network Protocols. 2006. Boston, MA, USA: IEEE Computer Society, 2006: 13
    [95] Stutzbach, D. and R. Rejaie. Understanding churn in peer-to-peer networks. 2006. Rio de Janeriro, Brazil: Association for Computing Machinery, New York, NY 10036-5701, United States, 2006: 189-202
    [96] Chu, J. C., K. S. Labonte, and B. N. Levine. Availability and locality measurements of peer-to-peer file systems. 2002. Boston, MA, USA: SPIE-Int. Soc. Opt. Eng., 2002: 310-321
    [97] Rosin. A., Measuring availability in peer-to-peer networks. http: //warhol. wiwi. hu-berlin. de/~fis/p2pe/paper_A_Rosin. pdf, 2003
    [98] Chen, P. M., et al. RAID: High-performance, reliable secondary storage. CMG Transactions, 1995(89-90): 21-51
    [99] Pandurangan, G., P. Raghavan, and E. Upfal, Building low-diameter peer-to-peer networks. IEEE Journal on Selected Areas in Communications, 2003, 21(6): 995-1002
    [100] Saroiu, S., P. K. Gummadi, and S. D. Gribble. A measurement study of peer-to-peer file sharing systems. 2002. San Jose, CA, United States: The International Society for Optical Engineering, 2002: 156-170
    [101] Bhagwan, R., S. Savage, and G. M. Voelker. Understanding availability. 2003. Berkeley, CA, USA: Springer-Verlag, 2003: 256-267
    [102] K., K. and F. T., Measuring large overlay networks-The overnet example. Proc. of the KiVS2005., 2005
    [103] Christin, N., A. S. Weigend, and J. Chuang. Content availability, pollution and poisoning in file sharing peer-to-peer networks. 2005. Vancouver, Canada: Association for Computing Machinery, New York, NY 10036-5701, United States,2005: 68-77
    [104] Hughes, J., K. R. Lang, and R. Vragov, An analytical framework for evaluating peer-to-peer business models. Electronic Commerce Research and Applications, 2008,7(1): 105-118
    [105] Joung, Y. J., Approaching neighbor proximity and load balance for range query in P2P networks. Computer Networks, 2008, 52(7): 1451-1472
    [106] Kobatake, K., S. Tagashira, and S. Fujita, A new caching technique to support conjunctive queries in P2P DHT. Ieice Transactions on Information and Systems, 2008, E91D(4): 1023-1031
    [107] Tian, Y., D. Wu, and K. W. Ng, A novel caching mechanism for peer-to-peer based media-on-demand streaming. Journal of Systems Architecture, 2008, 54(1-2): 55-69
    [108] D. Stutzbach and R. Rejaie, Towards a Better Understanding of Churn in Peer-to-Peer Networks. Technical Report CIS-TR-04-06, 2004
    [109] Erman, D., D. Die, and A. Popescu. BitTorrent traffic characteristics. in 2006 International Multi-Conference on Computing in Global Information Technology.2007.Bucharest,Romania:Institute of Electrical and Electronics Engineers Computer Society,Piscataway,NJ 08855-1331,United States.p.7 pp
    [110]田敬,对等存储系统中的数据可用性与安全性研究:[博士研究生学位论文[.北京大学,2007
    [111]Ilie,D.and D.Erman.Peer- to -peer Traffic Measurements.Research Report,Department of Telecommunication Systems,School of Engineering,Blekinge Institute of Technology,S-371 79 Karlskrona,Sweden,2007
    [112]Silverston,T.,et al.Measuring P2P IPTV traffic on both sides of the world,in Proceedings of the 2007 ACM CoNEXT conference.2007,ACM,2007:1-2
    [113]Vu,L.,et al.,Measurement and Modeling of a Large-scale Overlay for Multimedia Streaming,in Qshine.2007,ACM:Canada
    [114]Cha,M.,K.P.Gummadi,and P.Rodriguez,Channel Selection Problem in Live IPTV Systems,in SIGCOMM'08.2008,ACM:Seattle,Washington,USA
    [115]Yishuai,C.,C.Changjia,and L.Chunxi.A Measurement Study of Cache Rejection in P2P Live Streaming System.in Distributed Computing Systems Workshops,2008.ICDCS '08.28th International Conference on.2008.Beijing,China:IEEE,2008:12-17
    [116]Silverston,T.and O.Fourmaux,P2P IPTV measurement:a case study of TVants.Proceedings of the 2006 ACM CoNEXT conference,2006:1-2
    [117]Leonard,D.,et al.On static and dynamic partitioning behavior of large-scale networks.2005.Boston,MA,United States:IEEE Computer Society,Los Alamitos,CA 90720-1314,United States,2005:345-357
    [118]Bin,L.,Z.T.Li,and T.Hao,A measurement study of peer-to-peer applicationsart.no.67951M,in Second International Conference on Space Information Technology,Pts 1-3,C.Wang,S.Zhong,and J.L.Wei,Editors.2007,Spie-Int Soc Optical Engineering:Bellingham,2007:M7951-M7951
    [119]Rhea,S.,et al.,Handling churn in a DHT in Proceedings of the annual conference on USENIX Annual Technical Conference.2004,USENIX Association,2004:10
    [120]Resnick,S.I.,Adventures in stochastic processes.2002:Birkhauser Verlag.626
    [121]Kato,D.,Latency Model of a Distributed Hash Table with Big Routing Table,in Proceedings of the Fourth International Conference Peer-to-Peer Computing.2004,IEEE Computer Society,2004:274-275
    [122]高乾.一种分层次的差异型P2P存储体系.软件学报,2007,18(10):2481-2494
    [123]Rosenblatt,M.Remarks on some nonparametric estimates of a density function Annals of Mathematical Statistics,1956,27(6):832-837
    [124]Parzen,E.On estimation of a probability density function and mode.Annals of Mathematical Statistics,1962,33(8):1065-1076
    [125]刘亚杰,窦文华.P2P流媒体--一种新型的流媒体服务体系.计算机科学,2004,31(4)
    [126]Ying,L.,et al.Video transmission scheduling for peer-to-peer live streaming systems,in Multimedia and Expo,2008 IEEE International Conference on.2008.Hannover,Germany:IEEE,2008:653-656
    [127]Yi,C.,D.Liang,and X.Yuan.Optimizing P2P Streaming Throughput Under Peer Churning.in Global Telecommunications Conference,2007.GLOBECOM '07.IEEE.2007.Washington,DC,United States:Institute of Electrical and Electronics Engineers Inc.,New York,NY 10016-5997,United States,2007:231-235
    [128]Bo,L.,et al.Inside the New Coolstreaming:Principles,Measurements and Performance Implications.in INFOCOM 2008.The 27th Conference on Computer Communications.IEEE.2008.Phoenix,AZ,United States:Institute of Electrical and Electronics Engineers Inc.,Piscataway,NJ 08855-1331,United States,2008:1031-1039
    [129]E1 Saddik,A.,et al.PECOLE:P2P multimedia collaborative environment.Multimedia Tools and Applications,2008,39(3):353-377
    [130]Liang,C.,Y.Guo,and Y.Liu.Is Random Scheduling Sufficient in P2P Video Streaming? in Distributed Computing Systems,2008.ICDCS '08.The 28th International Conference on.2008.Beijing,China:IEEE,2008:53-60
    [131]Kulbak,Y.and D.Bickson.The eMule Protocol Specification.2005,Jerusalem: DANSS (Distributed Algorithms, Networking and Secure Systems) Lab School of Computer Science and Engineering The Hebrew University of Jerusalem
    [132] BitTorrent. http: //www. bittorrent. org/protocol. html, 2008
    [133] Wang, X., et al. The design of video segmentation-aided VCR support for P2P VoD systems. Ieee Transactions on Consumer Electronics, 2008, 54(2): 531-537
    [134] Bo, L., et al. An Empirical Study of the Coolstreaming+ System. Selected Areas in Communications. IEEE Journal on, 2007,25(9): 1627-1639

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700