Font Size: a A A

Study On The Technology Of Network Information Audit Based On Content

Posted on:2009-09-16Degree:MasterType:Thesis
Country:ChinaCandidate:W XiongFull Text:PDF
GTID:2178360272973587Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid growth of Internet, government,companies, and even individuals rely on Internet to communication with others, the network and information system is playing basic and integrated role, However,new challenges are posed on the network's security, there has various illegal attacks of the internet security. So the problem of the network's content security has been more and more serious.Nowadays one of the fundamental missions governments and organizations in countries are faced with is research on special tools timely discovery, prevention and control of various crimes on the network. By capturing and analyzing all or part of the information of network. Network Content Auditing and Monitoring System audit and monitor the network's information content and the behaviors. It can help us resolve security problems.At present,the research on technology of Network Content Auditing and Monitoring System is hotspot in the field of network security,lots of key technology are still in their childhood.In this thesis, the current situation of network's content auditing and monitoring technologies used in firewall and intrusion detection system is analyzed from view of network security origin, some key technologies of Network Content Auditing and Monitoring System based on TCP/IP protocols is studied from architecture model, data capture, packet reassembling and data mining.Some works has been done in details below:1. A Network Content Auditing and Monitoring System model is proposed in this thesis and parts of the model is introduced to improve and extend system's functions.2. A architecture model of data acquisition is discussed to the current situation in this field, the thesis also introduced functions and relationship among parts of the model and explained technologies of data acquisition and analysis.3. A data restoration algorithm can differentiated protocols in the application layer according to some identify characteristics and can reassembled all packets in a session to obtain a integrated report based on a session is discussed to various protocol and complex problems .4. According to characteristics of heterogeneous and complex data source and system, the thesis also analysis technologies of data mining used in Network Content Auditing and Monitoring System .
Keywords/Search Tags:network security, content auditing, data capture, Data reassembling, Data Mining
PDF Full Text Request
Related items