Font Size: a A A

Large Flow Of Real-time Network Monitoring, Network Backbone

Posted on:2006-11-22Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y JiangFull Text:PDF
GTID:2208360152998612Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of network, user's have more and more quality of services (Qos), especially in education area. It was used in researching,teaching and exam. But it also takes some problems, just as how to protect the security of data,intruded by virus and attacked by hackers. In educational network, there is few kind of security technology. We usually use antivirus software,firewall and intruded detection system, But it's not good for protecting the leak of security in network and getting the proof of it. So we need to audit and analyze the content of the information. We can solve this problem by using a network detecting system based on content of the packet; this system can find the special information in the traffic by searching the key word in the packet. This dissertation include the reason of security problem beginning,the model of information analyze system and the technology of information detection. We have stood the technology of information audit system in network. We analyze the choke point of capture the packet in network and predigest the Boyer-Moore algorithm for current environment. At last we design and realize the information audit and detect system which based on the content of packet. The dissertation also discussed the flow classification algorithm.
Keywords/Search Tags:Information Audit, TCP/IP, protocol analyze, Packet Reassembly
PDF Full Text Request
Related items