Font Size: a A A

Design And Implementation Of Web Access Monitoring System Based On Url Analysis

Posted on:2010-09-20Degree:MasterType:Thesis
Country:ChinaCandidate:H P WuFull Text:PDF
GTID:2198360308478405Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the fast development of Internet, more and more commercial value of Internet is developed. So,some people begin to put out much unhealthy information to Internet for benefits. This information is addictive, and it violated China's law seriously. The problem about harmful web information becomes more and more important. Now, people usually use firewall to filtrate network packets, but with the popularization of wide band, the web traffic increases rapidly, and firewall will cause network delay. It becomes a bottleneck and influences network performance.So,it is necessary to design a web monitor system that does not affect network performance.This system is developed with C language on Linux. It is designed based on network listen mode, so it can get packets but do not influence network performance.This system picks up the URL information from IP packets, and then compares it with the data in blacklist by a fast string matching algorithm. If the URL is matched, the system sends a HTTP redirection message to user to redirect the requirement to another web site. So, the web site is intercepted.First, this thesis proposes the practical significance of this system. Second, this thesis analyses the feasibility of the system from technique, society and so on, and then this thesis analyses the requirement, structure and working mode of this system from a practical point. Third, this thesis analyses the network protocol and system requirement, and then designs the function of every module.The implementation part introduces the working processes and techniques of every module. Especially, it introduces the implementation method of intercepting web site.It also introduces a fast string matching algorithm.At last, the system is tested, and aspects for the system to improve are given as well.
Keywords/Search Tags:web interception, network security, HTTP redirection, network monitor, URL analysis
PDF Full Text Request
Related items