Font Size: a A A

Research And Implementation Of Network Information Audit Control System

Posted on:2021-09-14Degree:MasterType:Thesis
Country:ChinaCandidate:K XuFull Text:PDF
GTID:2518306050473614Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of contemporary network technology,it brings convenience to human beings and also brings hidden dangers in network security.For example,when browsing some bad websites,it will cause bad information to be transmitted,personal privacy will be leaked,and young people will be induced.Cybercrime and other issues,the use of cybersecurity involves the immediate interests of all people,and the public's call for a healthy Internet environment has become stronger.Traditional network audit products mainly analyze network traffic from packet header information such as IP,port number,and protocol characteristics.However,in recent years,with the continuous enhancement of network technology,the format of business information content has become more and more complicated,and most applications have started to use random Port numbers,traditional network packet detection methods have been unable to effectively detect these network traffic.By comparing some current application recognition systems,this paper points out that the current application recognition has the problems of low recognition accuracy and high misrecognition rate.Based on this,a network information audit control system based on network application layer payload content detection is proposed.Safety technology products are a good complement.In order to improve the system application recognition rate and reduce the application misrecognition rate,this paper describes the related transformation and innovation of DPI application recognition technology,including ACSM pattern matching algorithm transformation technology,state machine creation,construction of DPI knowledge base,and dynamics of multiple features Jump matching and other aspects are discussed in detail in terms of packet capture,session flow analysis,DPI identification,application auditing,audit storage,and application traffic blocking.This article describes the system architecture model,as well as the implementation methods and structural models of the various sub-functional modules such as the monitoring subsystem,audit subsystem,and knowledge base extraction.Then,the system initialization unit,DPI identification control unit,system and miscellaneous management unit,and database design are described.The unit etc.have made detailed design for the system.Finally,the system is tested and the test results are analyzed.The test results show that the system has a high recognition accuracy rate and a low false recognition rate.The conclusion and outlook are made at the end of the article,both the advantages and disadvantages of the system are proposed,and the future is looked forward to.The system will continue to expand and improve the DPI knowledge base and continuously enhance the audit control effect of network application traffic.This system will play an important role in the contemporary complex network environment,and it is extremely meaningful for families,businesses,and society.
Keywords/Search Tags:cyber security, Information audit, DPI, ACSM algorithm, Dynamic jump
PDF Full Text Request
Related items