Font Size: a A A

Detection Algorithm Design, Based On Log Information Statistics (abnormal)

Posted on:2005-07-21Degree:MasterType:Thesis
Country:ChinaCandidate:X M LuoFull Text:PDF
GTID:2208360125464295Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
This paper passes to attackstone to the familiar network in some inside the technique proceeds the analysis, and here the foundation ascends to put forward to aim at the sexual project, the point consist in setting up an examination for basing on bureau daily record in the area net information to the network invading behavior can doing on time accurately distinguishing system, should examine the point of the system the design the main in link to aim at now some a networks the attack responds to the Responding algorithms design the top technically.First, this text the related mold a necessary support for proceeding an introduction of degree, primarily emerging system upper stream function mold an examination for of applied contents with main effect, this part of the comparison that-contents occupy in whole thesises not very, but demand than in details expatiating, in order to for wanting designing system doing technique of that system.The next in order, proceed the reasonable design to the system a defense for being placed in system construction. Here the model that put forward according to applied current choice in current technique is problem that strategy that base on the role to visit the control, because that system is a construction of multilevel relation, therefore among them need to be provided certain the modification on the degree calculate way, this part will proceed the meticulous elucidation to that abstract model, to modification the algorithms will give the analysis, its usefulness consist in overcoming the passage of covert channel . This part is a necessary cushion that examine system's design.Again, some a technique for familiar network attackstoning technique proceeding concretely meticulous analysis, one by one explaining its applying tos principle and characteristics, this part conduct and actions the premise that algorithms put forward with basis, give the longer space proceeding explain, and assist to proceed with the procedure technique explain, have the original code all with C++ language or the form of VB give out. For each a algorithms, all detailed as to it' s the principle, relevant function proceeds the elucidation, clear and definite display its characteristics. The technical complexity in attack in network comes to a decision the design of the safe system to do once and for all anything but, having no what any safe project is to do not need to develop, in with every kind ofly continuously the attack technique that appear did the process of the conflict, any project needs on time of complement with perfect, this come to a decision this text an every kind of calculate way for putting forward too is to need in application perfect oneself. Here the attack technique that study includes the DDoS attack the inside the most familiar SYN Flood, Smurf, UDP Flood and the nonlicet monitor combine to the homologous examination algorithms.Finally, the actual case a meaning for, to examining calculate way proceeding reasonable valuation, displaying its in actual application of the combination network attack inside. A case for adopting an advantage for all coming from true network attack behavior, and here part of tallying up this text examining means improves with demand with the link of the development.
Keywords/Search Tags:construction of multilevel relation, covert channel, Examination algorithms
PDF Full Text Request
Related items