Font Size: a A A

The Model And Implementation Of Normalizing Network Traffic Pattern With Anonymity For Mission Critical Applications

Posted on:2007-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:W X HuFull Text:PDF
GTID:2178360185961978Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, the online security has already become the important problem that each network user has cared about. The Camouflaging Network Traffic being regarded as the information security is a kind of valid means in preventing the hostile Network Traffic analysis and has well remedied such tradition as access controlling , identity authentication , fire wall , etc. of visiting and protected the problem that the mechanism can't be solved .Normalizing Traffic Pattern with Anonymity theory being one of the technology as preventing the flow analysis, not only has originality in theory, but the research of this theory is in more advanced level in China. The scheme to prevent traffic pattern analysis for an IP-based network is based on the following two aspect:1) steadily normalizing traffic, and 2)hiding IP addresss in packets. Based on the Normalizing Traffic Pattern with Anonymity theory advanced by Professor MingLi of National University of Singapore, in this study the algorithm of main technology was confirmed and further applied in the real-world examples of network instrusion. The initial normalizing Traffic Pattern model was setup to examine and improve the theory.The main contributions in this dissertation are as follows:1. A Normalizing Traffic Pattern with Anonymity theory based Normalizing Traffic Pattern Model in real-world of network is set up, turning the theory achievement into the achievement of practicing.2. With the Petri net, commonly used in large-scale project, describe the resource relationship of Normalizing Triffic Pattern all-around, putting the logic relation of each link in order.3. The cache management method was improved, putting forward that replace the dynamic LenCache management for the static LenCache management to avoid the frequent information exchange during the excution procedure,which effective enhance standardization the model operating efficiency.4. Improved the method of constant package-length which was proposed by the theory. Changed static length of packet scheme into dymanic packet length scheme which adapt for vary of network protocol and different data-length characters of network service. Increased the flexibility of the Normalizing Traffic Pattern model in real network environment.5. Improved the source/destination IP address encryption strategy of this theory with taking advantage of the parameter negotiation during adjancent router in the process route. With the source anonymous communication between the adjancent...
Keywords/Search Tags:Normaling Traffic Pattern with Anonymous, Traffic analysis, Petri net model, network security
PDF Full Text Request
Related items