Font Size: a A A

Research Of Network Penetrating Technique

Posted on:2009-06-24Degree:MasterType:Thesis
Country:ChinaCandidate:L PengFull Text:PDF
GTID:2178360245469412Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of network, Firewalls, IDS/IPS are widely adopted to detect and protect various network attacks. But, network penetrating technology is now hot and popular, which integrates proxy technology, encrypt tunnel and P2P technology, etc. It can easily penetrate the current security devices, so easily access illegal websites and put the attacking code and the private data to destination host, this damages network environment and threatens information security of individual, company and the nation. So the research of network penetrating technology is full of the important academic meaning, social significance and practical value, and is very challenging.Firstly, this paper analyzes and researches the popular application tools like Privoxy, Stunnel and TOR; then, a penetrating proxy system which called PROProxy has been designed and implemented. This system uses TOR as the platform to communicate anonymously with outside, implements the mutual conversion between HTTP and SOCKS5 proxy modules, and solve the problem of leaking address of visiting server by local DNS. In addition, SSL authorization is implemented by OPENSSL library, which makes up of TOR to support authorization function; encrypted communication is implemented by Crypto++ library, which ensures the security between sender and trusted proxy in anonymous system. The test results show that PROProxy is stable, excellent, and can penetrate network security devices successfully.Secondly, this paper makes a forward research to penetrating system, and aims at comprehending and mastering penetrating technique to design and implement penetrating protection filtering system. Thus, we bring data flow management concept to penetrating system successfully, and design and implement the filtering system DSFS. This system can inquire and filter the network behaviors on-line; it includes packet capturing, packet classification, flow recombination, pattern matching, and so on. This system runs well and stable.At last, this paper summarizes all the work, and point out the future research of penetrating technology.
Keywords/Search Tags:Proxy, Tunneling, Anonymous Communication, SSL, DSMS
PDF Full Text Request
Related items