Font Size: a A A

The Design And Implementation Of Network Traffic Safety Monitoring System

Posted on:2017-10-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y ShuFull Text:PDF
GTID:2348330536980064Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the wide use of broadband,P2 P video download digital content frequency increased,various network applications widely used in our daily life,the growing network viruses and attacks on web sites,host,the bandwidth of the network congestion block attacks,such as DDOS also cost a lot of network operators,the traditional network traffic analysis tool for single function,can't satisfy the requirement of the new situation.Communication operators need a set of network security situation analysis,network events back positioning,real-time alarm function such as a complete analysis of network traffic safety monitoring system,to integrate the network traffic information,as a network strategy adjustment optimization,to ensure the safety of network reference basis.Therefore,how to build communication operators network traffic safety monitoring system,has become an important subject of communication operators.This thesis analyses the necessity and feasibility of construction scheme and put forward the integrated system,the scheme with DPI,DFI)as the source of traffic analysis,through the collection,mining and analysis of traffic and log data,such as events related to security,for the enterprise users to provide network security status analysis and early warning service.Another design "anomaly detection" "customer self-service" function,automation of anomaly detection services,through comparative analysis of several kinds of detecting model,and set the alarm control mechanism,to detect the abnormal report rendering with visual graphics,help network security operations staff to locate fault,enhanced security situational awareness and provide the service for users to timely detection and troubleshooting problems,realize the centralized rendering.
Keywords/Search Tags:Network security, DDoS Attack, Data collection, Abnormal traffic detection
PDF Full Text Request
Related items