By analyzing QQ games traffic, it was found that its traffic could be divided into three kinds: transimission control protocol (TCP), g2dhttp and non g2dhttp. The relationship of g2dhttp traffic and QQ game traffic was obtained. The g2dhttp traffic could provide all information of users, such as user accounts, QQ accounts and game names etc.. The recognition method, which matched key words for
... [Show full abstract] the g2dhttp traffic, was fitted for traffic monitor and analyzer (TMA) probe. Therefore, a traffic monitoring method of QQ Games based on probe of TMA was presented. In this method, incoming and output packet numbers and total traffic could be calculated by recognizing g2dhttp traffic. Comparing with real network data, the error was small. The method can be used to estimate the traffic of QQ Games in high speed network.