Font Size: a A A

Design And Implementation Of The Application Layer Protocol Analysis In Research Of Network Traffic Analysis

Posted on:2009-03-06Degree:MasterType:Thesis
Country:ChinaCandidate:W B HuFull Text:PDF
GTID:2178360245469500Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, new type network applications are emerging continually and the demand of network bandwidth is increasing. A variety of applications based on Peer-to-Peer technology use up a lot of network bandwidth. So, network overcrowded and users hope to understand the component of the traffic and identify all kinds of network traffic. Currently, many applications and protocols use unpredictable ports, non-standard ports or ports shared other protocols. It is impossible to identify network traffic by simply detecting the number of ports. For the above reasons, we need to study the traffic analysis based on IP network environment.This paper provides a solution to analyze network traffic. The two preceding chapters introduce the basic concepts, classification and significance of the network measurement. The third chapter is about current common module of capture and filter packets, mainly discussing the BPF process, detailed presentation on capture packets working principle, analyzing similitude and difference on the architecture and function of different module of capture packets, indicating the advantage and disadvantage of performance of every module of capture and filter packets. This chapter also includes Libpcap based on BPF module of capture packets. The fourth chapter discusses the analysis method of protocol and introduces the analysis method of non-application layer protocol. The fifth chapter focuses on design and implementation of the application layer protocol analysis. The setting-up of the testing environment and the results of testing also are introduced. The ideas of the analysis of the application layer are discussed in detail. Foremost, we explain the core idea of pattern matching and pattern definition file. Finally, the sixth chapter sums up the technical characteristics of the IP network traffic analysis and gives some considerations for further study.
Keywords/Search Tags:Network Traffic Analysis, Application Protocol Analysis, Package Capture, Pattern Matching
PDF Full Text Request
Related items