Font Size: a A A

Design And Implementation Of Network Traffic Monitoring System

Posted on:2014-01-19Degree:MasterType:Thesis
Country:ChinaCandidate:C LiuFull Text:PDF
GTID:2248330398470920Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the wide range of applications such as P2P and VoIP network technology, a large number of P2P, VoIP protocols and application software began to appear, such as thunder software, the network VoIP telephone software,etc., Although it makes our life more convenient, it also brings a lot of serious problems. Such as taking up a lot of network bandwidth, spreading network viruses. How to limit and manage P2P traffic is becoming the current research focus which is also a problem that needs to be resolved by network operators and network managers.1This paper focuses on the Internet traffic detection technology, mainly analysis the protocol of P2P and VoIP software which occupy most of the traffic bandwidth. This article describes the background of the research topic, research status, and the main research.2This paper analysis of the necessity of traffic monitoring, and makes research on the DPI technical and DFI technology of traffic control technology. DFI technology includes the port detection technology, characteristics of the application layer detection technology, packet length feature-based detection technology, application layer gateway identification technology, described the various technical features in detail.3According to characteristics of the network traffic, this paper designs the network traffic monitoring system, including the architecture of network traffic monitoring system, the network deployment of traffic monitoring system and the analysis of data packet traffic detection, described the various traffic monitoring modules in detail and the contact of each module.This paper makes a detail introduction on advantages and disadvantages of three deployment methods of network traffic monitoring system.The system uses hybrid deployment. This paper puts forward the technology of characteristic database based on the process of packet flow detection. We also propose encryption rule and combination of keyword and packet length rule, design the network traffic detection process.4This paper introduces a single pattern matching algorithm and the classical pattern matching algorithm, analysis the advantages and disadvantages of single mode algorithm and multi model algorithm, and the reason of using AC-BM algorithm. This paper puts forward identification process of the characteristics of the database based on the degree of difficulty of the traffic identification. Analysis the process of the characteristics of the database.Finally this paper researches the P2P technology and VoIP technology, also analysis the process of the protocol analysis of thunder and skype, giving the general process of protocol analysis of the network.5Finally in this paper, we test the main software in the internet, including identification, blocking, and current limit. This article makes a deep research of the system of false positives analysis. Finally, the testing results show that the design of the traffic monitoring system achieve the goal of the design.
Keywords/Search Tags:P2P, VoIP, DPI, protocol analysis, traffic monitoring, network deployment
PDF Full Text Request
Related items