Font Size: a A A

Research And Application Of Traffic Identification Technology In Intelligence Transmission Network

Posted on:2015-02-19Degree:MasterType:Thesis
Country:ChinaCandidate:W X ShenFull Text:PDF
GTID:2268330428498010Subject:Network and information security
Abstract/Summary:PDF Full Text Request
Intelligence is one of the main transmission network transmission of intelligenceinformation, with the influx of a large number of continuous application of advancedinformation technology, mass of information on the transmission capacity of a higherintelligence requirements. Military intelligence analysis and processing of information in sucha background, it has a timeliness is the key, and therefore must have the security of militaryintelligence, quick intelligence transmission capacity.With the advance of the new revolution in military affairs, the world is activelyimproving the quality of military transmission networks. Currently,the lack of militarytransmission network band-width is presented in military transmission networks, especiallythe large flow of P2P and streaming media services consuming large band width resources. So,it is urgent to control the flow of network traffic to meet the needs of real-time demands ofdifferent levels in military intelligence network. It further escalates the transmissioncapabilities of military transmission networks.Modern warfare, battlefield changing circumstances, the requirements of command mustalso be quick and timely intelligence information transfer capability which put forward higherrequirements. One of the key to win the information war, we must grasp the infor mationadvantage, and grasp the information superiority is to have the ability to transmit informationquickly. Along with promoting a new revolution in military affairs, especially with thedevelopment and conduct joint operations theory, non-war military operations and distributednetwork operations practice, the new military intelligence mission mode transmission capacityconstantly new demands, so each of the US-led military power in the world are activelyimproving information transmission network.Aiming at improving the efficiency of band-width utilization, and combining the realneed of military transmission network construction, it introduces the flow-controllingsolutions. The paper is conducted from the overall design, framework, architecture func tionmodule, and system-distributed mode five aspects to achieve the original flow-controllinggoal.Considering problems of data flow on random ports, dynamic ports and encryptiondata-flows,the article depicts a new method called DPDFI based on port-identificationtechnology, the deep packet inspection (DPI) and the depth/dynamic flow detection technology (DFI). Andthen, the paper projects the flow-controlling method from original goal,whole architecture and work procedure aspects, applying multi-core processing method andhardware-platform based on parallel computing.In experimental conditions of actual network environment, the traffic-identificationratiomethod is conducted and verified. Compared to the deep packet inspection (DPI), DPDFI canretain efficiently and get6.63%escalation. To present the method’s actual value and itseffects,tests are conducted and the results show that the traffic-controlling system’s needs aremet effectively.Finally, the paper presents the unresolved issues of network traffic-identificetion moduleand key directions of future research of military transmission network.
Keywords/Search Tags:intelligence information, intelligence transmission network, peer-to-peer, protocolidentification, traffic identification, deep packet inspection (DPI), deep/dynamic flowinspection (DFI)
PDF Full Text Request
Related items