Font Size: a A A

Host Network Traffic And Network Behavior Characteristics

Posted on:2011-07-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y H LiFull Text:PDF
GTID:2208330332973026Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology and the continuous expansion of network scale, Web services are transforming from traditional to multicultural ones and the deepening levelof heterogeneous networks, computer network is becoming more and more complex, so there is an urgent need for the network traffic in real time, on-line monitoring and management. At the same time, business websites need to analyze users'behavior and tastes in order to provide more satisfactory services to meet their commercial interests. And security is the key factor that is concerned as a constraint to the sound development of Internet, government, research institutions and other non-profit web site need to analyze users'structure and the characteristics of their behavior on network to support the government policy.Network traffic which can tell us detailed flow characteristics, such as flow size, protocol distribution, packet size distribution etc, so as to guide network operations and management. It also plays an important part in guiding network planning.and, the classification of users'behavior on network and analysis based on this study are in an urgent demand.This paper will combine theoretical methods with practical analysis and do further studies on flow and the characteristic behavior. Network Traffic and behavior of the host computer conducted a series of studies. Main results are as follows:Use tools such as WinPcap capture the host computer's network traffic by analyze the received TCP/IP protocol stack layers of protocols and protocol time distribution of packet distribution. And get the packet arrival process at different times, using the time-analysis of variance method, Hurst parameter estimation to determine the statistical characteristics of packet arrival process is self-similarity. Experiments show that the host within a Fast Ethernet has a self-similar characteristics. By the host computer protocol traffic capture analysis has been the distribution of the various agreements. The composition of different protocols of traffic network, a true reflection of the current application status. And in Network behavior, the protocol data unit based on the host computer capture, using TCP/IP protocol stack on the host network theory analysis of patterns of behavior, this paper puts forward TCP/IP network, TCP session mechanism; TCP session flow characteristics of the logical model of network data In the layers of feature extraction; TCP session network data stream feature extraction model system applications. Through the packet analysis and master the principles of TCP three-way handshakes mechanism of TCP conversation, on this basis, extract the various characteristics of TCP header TCP data stream transmission, finding their commonalities, constructed TCP conversation feature model network data flow.TCP has been constructed using the network data flow model based on the extracted features of the TCP/IP reference model layers of the TCP data stream characteristics. In the actual network environment to run tests based on the TCP conversation flow characteristics of the network data model system effectiveness.
Keywords/Search Tags:network traffic, network behavior, the capture of data packet, protocol analysis
PDF Full Text Request
Related items