Font Size: a A A

The Research On Key Technologies For Monitoring Local Area Network

Posted on:2008-01-17Degree:MasterType:Thesis
Country:ChinaCandidate:K CuiFull Text:PDF
GTID:2178360245993262Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of Internet technologies and electronic informationization, network security has become hot spots of computer science. Especially in the Local Area Network (LAN), effective monitoring operational status of every equipment is very important.This paper studies key techniques for monitoring LAN in accordance with some problems, including process automatic loading and hidden, network covert communications, network data secure transmission.About process auto loading and hidden, the paper analyzes the current popular technology (modifying registry startup items, adding system tasks, seizing documents, registering for the services; listing process of deception, deceiving dynamic link library, injecting remote thread), then adopts the registry hidden since the launch and remote threads into the program to achieve automatic loading and hidden purposes.About the network covert communications, this paper analyses the transmission of deception related technologies (port multiplexing, Internet control message transmission association, port hidden), then adopts socket port hidden to achieve covert communications program.About network secure communication technology, this paper analyses the traditional transmission network security technology and cryptographic algorithms (block cipher and stream cipher), raises a mixed-cipher network security protocol (TJU Secure Communication Protocol)on the basis of existing safe communication protocol realizing data encryption, authentication, proved to have better secure transmission mechanism.Finally, this paper integrates these technologies, designs and codes a prototype system monitoring LAN. Experimental results show that these technologies in a prototype system have been fully used, play a key role. In actual operations, be better able to monitor the LAN node operation.
Keywords/Search Tags:Network security, Local area network monitoring, Secure communication protocol, Process hidden
PDF Full Text Request
Related items