Font Size: a A A

The Design And Implement Of The Kenel In Network Behavior Management Gateway System Based On Linux

Posted on:2010-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2178330338485525Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Along with the universality and extensive application of the Internet, more and more people start using Internet. But because of the particularity of the network and the restriction of people's ability to discriminate,it more and more relies on each kind of soft calculator and hardware to control people's network behavior.That it isn't available to ignore the network behavior has already become the common noise of shouting of large Internet customers.How to avoid problems and venture while making use of the advantages of the Internet ? The only effective solution is the constrained network behavior management.The network behavior management gateway is generally fixed attention on the applies need of the internal Internet network management. While doing no influence to the running efficiency of the network and changing the configuration of the existing network, using the system to carry on an effective management and control to the internal personnel.Inside the pit mold piece is totally divided into four parts:The discharge statisticses subsystem, P2P agreement to identify and controls subsystem and flow medium agreement to identify and control subsystem and WEB the black and white list control subsystem.The sub system of the calculating the rate of flow use the network function construction of Netfilter. This system realize the function of calculating the rate of net flow on the base of Linux operate system. The sub system of discern and control of P2P agreement realizing the discern and using MySQL to build the date form of P2P agreement under Linux operate system. This can control the rate of glow of P2P agreement. The discern and sub system of control of the flow media realize the flow media`s function of discern and control,catching the IP bag,distinguishing agreement,controling agreement,saving module. The sub system of the web black and white name list is aimed at explore the web page through the black and white name list,we can controli ng the achievement of exploring the web page.In this system, net security technology measures are used to monitor,control and audit to those hosts connecting Internet in inner network, monitor and manage the condition of network connecting, the circs of user online, the content of network communicate and the resource impropriated by individual. We adopt the manage mode that fortify before, monitor middle, event audit, combining policy management, resource monitoring, behavior controlling, content auditing, using auditing, realize the management and controlling to the whole network and all terminal in dynamic to improve the efficiency of the network.
Keywords/Search Tags:Statistical traffic, Protocol Identification, Netlink, Netfilter
PDF Full Text Request
Related items