Font Size: a A A

Research And Implementation Of Monitor And Management System For Illegal Behaviors

Posted on:2015-07-07Degree:MasterType:Thesis
Country:ChinaCandidate:J LiuFull Text:PDF
GTID:2298330431487264Subject:Information security
Abstract/Summary:PDF Full Text Request
With the developments of computer science and network technology, the Internet recently plays a significant role in our lives. The main purpose of providing internet for employees is convenient for their works. However, the employees’illegal internet behaviors are widespread in company. It not only violates the original purpose of providing internet, but also seriously limits the bandwidth of the main business. At the same time, the illegal internet behaviors of employees’can also bring problems, such as computer viruses and so on. In order to regulate the internet behaviors of employees’ effectively, and protect the companies’kernel network, companies need a system to control employees’internet behaviors.According to the needs of companies, this thesis deeply studied the violation internet monitor and management techniques, then designed and developed an illegal internet behavior monitor and management system based on NDIS (Network Driver Interface Specification) and SVM (Support Vector Machine). This thesis also provides some tests to test and appraise the system entirely.Works of this thesis:(1) Providing the implementation of the network packet filtering module on the driver layer. This thesis has proposed and realized a network packets filter module based on NDIS Filter driver and achieved the purpose of controlling the Internet behaviors.(2) Providing the implementation of unknown web pages’ identification module based on SVM. This thesis has introduced the classified recognition technology base on SVM and implemented an unknown pages recognition module to identify the unknown internet behaviors and achieved the purpose of internet behaviors’ classified controlling.(3) Providing the system’s related tests. This thesis also proved the feasibility and availability of the system through the experiment and test, and summarized the available researches, then proposed the further research directions and the system’s optimization methods.
Keywords/Search Tags:Internet Violation Behaviors, Packet Intercept, NDIS, SVM, PacketFilter, Feature Extraction
PDF Full Text Request
Related items