Font Size: a A A

Real-time Monitoring And Controlling Forensics System Of Illegal Website And Its Services

Posted on:2005-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:J LaiFull Text:PDF
GTID:2168360152955318Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Beyond all doubt, 21st century is the century of information. The Internet has played a very important role in this information revolution, and it has been used more and more frequently in information exchange nowadays due to its fast rate transmission, low cost, high level information alternation and information resource sharing globally. However, people have realized that the Internet is not as good as our thought when they enjoy the convenience. Not only news reports, technology dynamics, public entertainments and other useful information are on the Internet, but there are plenty of other wicked ones, such as erotic, violent and evil things, on it as well. With such information, people have been disturbed very much in many ways. Moreover, these things can be a huge trouble for the country and society. How to monitor and control those wicked information so that they could not be a problem to us? As an important component of the Internet securing, securing content of the Internet information has been attached more and more importance these days.The relevant technology of securing content of the Internet information can be concluded into three aspects. One of these is the technology of content monitoring, such as content filtrating skills and anti-sweeping emails skills. Another one is the technology of monitoring and controlling, such as the Internet content audit skills and intrusion examining skills. The final one is the technology of network states monitoring and controlling, such as network data interception and analyzing. Combined these skills and networking firewalls or application agent to build asecuring content of the Internet information system, it can monitor and control the content much better. However, regarding from the working principle, we can find that most of these technologies are the technologies which is realized by intercepting the updated data streams on the Internet, and then obtaining and analyzing the data, and finally discovering harmful information, and filtrating and stopping them. By using this method, any data stream on the Internet will be intercepted despite whether the information is good or bad. Consequently, it will bring negative influence to the network performance, and moreover, it will cause law issues in case of over passing people's privates.Based on the police's requirements, all we need what is not only a computer system, which could intercept network data streams so that we can filtrate and stop wicked information, but also we need a successful active product which can discover any illegal website and evil information so that the system can monitor and control from the beginning of them and secure the content of the Internet.In this article, a design of a real-time monitoring and controlling forensics system of illegal website and its services has been proposed on the basis of understanding working flow the HTTP. The system sends the HTTP requirements from the pointed IP, and then it collects relevant data by receiving the response and the data information. It ignores what cannot monitor and control the website which is using the skill of data interception. Moreover, it avoids the blight, which is caused by snatching the data streams to analyze as well. In order to improve the veracity and the velocity of matching the key words of analyzing the website contents, another new method, which is an amended arithmetic of the original one, has been designed so that the new method could filtrate every appointed specific symbol between any two letters of a key word. Furthermore, the system offers a perfect function of data saving and enquiring so that uses can demand and quote easily. It also provides a self-designed expandable content grading formula, and an automatic alarming and haphazard managing system, which is based on the formula.
Keywords/Search Tags:illegal website and its services, real-time monitoring and controlling, content securing, HTTP scanning, data saving and enquiring
PDF Full Text Request
Related items