Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/8412
標題: P2P網路通訊及加密協定分析
The Analysis of Peer-to-Peer Protocol and Protocol Encryption
作者: 董祥群
Dong, Shun-Chin
關鍵字: Peer-to-Peer Network;點對點網路;Packet Classification;Packet Encryption;封包特徵;封包加密
出版社: 電機工程學系所
引用: 參考文獻 [1]Subhabrata Sen, Oliver Spatscheck, Dongmei Wang,”Accurate, calable In-Network Identification of P2P Traffic Using Application Signature”, WWW2004, May 17-22, 2004. [2]Wikipedia,”Peer-to-peer protocol” http://en.wikipedia.org/wiki/Peer-to-peer [3]Wikipedia, “bittorrent protocol”, http://en.wikipedia.org/wiki/BitTorrent_(protocol) [4]Wikipedia, “edonkey network” http://en.wikipedia.org/wiki/EDonkey_network [5]Yoram Kulbak, Danny Bickson, Scott Kirpatrick, “The eMule Protocol Specification”, DANSS of CS Hebrew University, January 17,2005 [6]eMule Wiki, “Protocol Obfuscation specification”, 2006 [7]Oreilly’s P2P Development Center, http://www.oreillynet.com/p2p/ [8]Bittorrent protocol encryption, http://en.wikipedia.org/wiki/BitTorrent_protocol_encryption [9] Gea-Suan Lin’s BLOG, http://blog.gslin.org/ [10]Azureus Project , “Message Stream Encryption specification”, 2006 http://www.azureuswiki.com/index.php/Message_Stream_Encryption [11]Mr.Friday, “透視BT系列”, MMDays, April 6, 2007. http://mmdays.com/2007/04/06/bt1/ [12]iptables project, http://www.netfilter.org/ [13]OLS3, “iptables zh documents”, http://203.68.102.40/techdoc/firewall/iptables-intro.html [14]L7-filter, http://l7-filter.sourceforge.net/ [15]Jamyy, ”L7-filter install document” http://cha.homeip.net/blog/archives/2005/12/l7filter.html [16]BitTorrent FAQ and guide http://www.dessent.net/btfaq/ [17]Robin Shih, “IM/P2P classify and management technology”, 2007 http://www.netfos.com.tw/download/TippingPoint/TP_IMP2P_tw.pdf [18]Bram Cohen, “Incentives Build Robustness in BitTorrent”, Workshop on Economics of Peer-to-Peer Systems, May 22, 2003. http://www.bittorrent.org/bittorrentecon.pdf [19]IPTV ipobar http://ipobar.com/vigor/
摘要: 
點對點(P2P)網路應用在1999年Napster出現之後興起,隨著ed2k以及BitTorrent的出現,其架構也從主從式架構逐漸發展成對等式架構。至今,P2P封包已經成為網際網路的主要流量。為了對P2P網路封包有所控制,以免影響其它的網路封包,部份的網路設備廠商與服務提供者就根據P2P網路封包的特徵對其進行限制與封鎖。相對的,P2P網路應用軟體的程式開發者,也對P2P網路封包進行加密,使P2P網路封包難以辨認。

本篇論文乃根據這樣的趨勢,先分析P2P網路封包的特徵,再針對現行的封包加密進行討論。在封包特徵方面,我們分析了TCP/UDP封包量與比例、特殊大小封包量與比例、通訊埠改變的特性、以及封包內容的特徵。在封包加密方面,我們分析了eMule所使用的模糊協定(Protocol Obfuscation, PO)以及Azureus所使用的資料流加密協定(Message Stream Encryption, MSE)。最後,我們也進行了實驗觀察對前述的分析進行驗證。

Since Napster appeared in 1999 and followed by new peer-to-peer (P2P) protocols such as ed2k and BitTorrent, the architecture of P2P networks changed from client-server architecture to distributed architecture. Nowadays, P2P network applications were very popular and their packets were one of the major flows on Internet. In order to prevent these large number of P2P packets interfering with other network packets, some of the network equipment manufacturers and Internet service providers began to limit or block P2P packets according to their characteristics. As a countermeasure, P2P software developers added packet encryption into the protocols and made P2P packets difficult to classify.

Based on this trend, this thesis first analyzed the characteristics of P2P packets and then gave a thorough discussion on P2P packet encryption. In packet classification, we analyzed the amount and ratio of TCP/UDP packets, the amount and ratio of large packets, the ports used, and the patterns of the packet payload. In packet encryption, we discussed Protocol Obfuscation (PO) for eMule and Message Stream Encryption (MSE) for Azureus. Finally, we did experiments to verify our analysis.
URI: http://hdl.handle.net/11455/8412
其他識別: U0005-3107200814233100
Appears in Collections:電機工程學系所

Show full item record
 
TAIR Related Article

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.