Font Size: a A A

Research On Remote Information Monitoring Technology

Posted on:2006-11-16Degree:MasterType:Thesis
Country:ChinaCandidate:S H YeFull Text:PDF
GTID:2168360152471609Subject:Information Science
Abstract/Summary:PDF Full Text Request
After we stepped into the information era, information has become our precious resource. Especially, Internet has filtered into all fields of our society, our decisions have been depending on the information more and more. In our country, the information war mainly based on Internet detection during the peace period, it detects the network information, finds out the criminalities, and collects the criminous witness in security. This paper puts forward Remote Information Monitor System(RIMS) based on GAWJ with the special demand of Internet detection. This paper mainly studies network data collection technique, Trojan horse technique and communication protocol referred in RIMS. In this paper, we develop the RIMS, so as to support the development of Internet detection. What this paper has done is as follows: Firstly, with the design and application of GAWJ, this paper analyzes the current status and development trends of Internet detection, and gives the RIMS. Then, this paper researches the core techniques of this system. In order to get useful data, it researches the network sniffing technology based on Raw Socket and mainly studies the technology of protocol analyze and data recombine. And it introduces the Trojan horse technique to the network data collection part, improves the process hiding technique, uses the triple-thread technique, and so on. It ensures the imperceptibility and stability of the network data collection part. Then this paper develops pseudo hypertext transfer protocol based on HTTP. This protocol is used in the communication between the network data collection part and the service part, which make the communication more covert. Finally, applying above technologies, this paper completes a remote information monitor system. And then introduces the technique solutions of its main modules of this system.
Keywords/Search Tags:Data Collection, Protocol Analyze, Process Hiding, HTTP
PDF Full Text Request
Related items