Font Size: a A A

Design And Implementation Of Mobile Internet Content Security Audit System

Posted on:2015-03-15Degree:MasterType:Thesis
Country:ChinaCandidate:X L JinFull Text:PDF
GTID:2268330425476167Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Nowadays, security audit system are mostly focused on the integrity and legitimacy of the data message, and for the content security audit are little researched, especially the mobile Internet are even less. This paper studies and designs a mobile Internet content security audit system, which applies the pattern matching algorithm. This system combines the single-mode and the multi-mode matching, realizing auditing the interactive content in the mobile Internet. Meanwhile this system can accomplish real-time monitoring and auditing the content security of the mobile Internet. In addition it also can assist the monitor to detect illegal information dissemination in the mobile Internet and provide evidence for later accountability.Research work of this paper mainly contains the following areas:(1)The article studies the basic theory and analysis method of security audit and selects the pattern matching algorithm to achieve mobile Internet content security audit system. Then thesis introduces the current commonly used single-mode and multi-mode matching algorithm, also it comparatively analyzes the features and shortcomings of these algorithms.(2)Combined with the keyword’s probability of occurrence in the Chinese context uneven distribution characteristics, this paper proposes improved BMMA (Boyer-Moore Algorithm for Mobile Internet Security Audit) Single pattern matching algorithm on the basis of BM (Boyer-Moore) algorithm. When making the determination of preferential match based on the keyword’s probability of occurrence, thereby this algorithm reduces the number of the second match, improves the matching efficiency to make it more suitable for Chinese context.(3)This paper proposes WMMA (Wu-Manber Algorithm for Mobile Internet Security Audit) algorithm to improve the insufficient of the WM(Wu-Manber) algorithm. This algorithm cancels the PREFIX table to save the query time and storage space, and it introduces a new TRAIL table to reduce the times of the hash calculation in the case of a Chinese character pattern string generally shorter. Application of this method can avoid the pattern string is too short to increase the system’s hash excessive computational burden. In the multi-mode matching uses the TF-IDF keyword weights for different priority to improve overall efficiency of the matching algorithm, and also to make the improved algorithm more suitable for the mobile Internet content security audit system based on Chinese context.(4)On the basis of the mobile Internet content security audit’s requirement and characteristic, the article completes the design and implementation of the mobile Internet content security audit system. This system’s data acquisition system via a proxy server to collect and process the mobile user’s network access data. Then the system set the keywords through the rule base, and finally through the content audit module it uses match the single mode and multi-mode algorithm model for content security audit.Finally, the system’s functional test of this article proves the mobile Internet content security audit system’s response time to be not affected the user’s operating experience.This work has been supported by the National Natural Science Foundation of China under Grant61371071, and Beijing Natural Science Foundation under Grant4132057, and the Beijing Science and Technology Program under Grant Z121100007612003.
Keywords/Search Tags:mobile Internet, security audits, pattern matching, Chinese characterfrequency, rule base
PDF Full Text Request
Related items