Netinfo Security ›› 2016, Vol. 16 ›› Issue (1): 51-58.doi: 10.3969/j.issn.1671-1122.2016.01.010

• Orginal Article • Previous Articles     Next Articles

Analysis and Implementation of QQ Software Protocol Based on DPI Technology

Lifen ZHENG(), Yang XIN   

  1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2015-07-28 Online:2016-01-01 Published:2020-05-13

Abstract:

With the rapid development of network technology, a sharp rise in the number of various instant message software, makes it difficulties to controll network traffic effectively. This paper analyzes the traffic of QQ’s three major services based on DPI(Deep Packet Inspection) and proposes a specific subdivision scheme. Then each module of QQ’s traffic identification system is introduced in detail. Finally, through running an experiment to verify its validity, result shows that the purpose of QQ traffic segmentation is achieved and each service communication can be blocked by configuring appropriate policy, which. And it can a reference for other IM software in protocol analysis.

Key words: QQ software, DPI, protocol analysis

CLC Number: