Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior Association

N/ACitations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Thunder, as the most popular P2P download software in China, has token up a large amount of bandwidth. And it is almost impossible to identify the encrypted thunder traffic. This paper proposes a method to detect encrypted Thunder traffic, featuring high precision and small computational cost. At the same time, this method doesn't depend on content inspection, nor does it violate users' privacy, which can be used flexibly in high-speed network environment, and deal with changes of statistical traffic properties. We implement a prototype system based on this algorithm, which can detect multiple versions of encrypted Thunder traffics in real time, achieving a precision rate above 95% and a recall rate above 95%. © Springer-Verlag Berlin Heidelberg 2013.

Cite

CITATION STYLE

APA

Xiong, G., Huang, W., Zhao, Y., Song, M., Li, Z., & Guo, L. (2013). Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior Association. In Communications in Computer and Information Science (Vol. 320, pp. 132–139). Springer Verlag. https://doi.org/10.1007/978-3-642-35795-4_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free