Font Size: a A A

Network Based LINUX Data Fetching Recognition System Design And Implementation

Posted on:2015-03-11Degree:MasterType:Thesis
Country:ChinaCandidate:P F LvFull Text:PDF
GTID:2298330431971201Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The development of computer technology and network technology has brought convenience to people’s life, has been more and more knowledge on the Internet, people can travel network information in the network, the ease and convenience of the network brings the information sharing and convenient. These service brings convenience and fast at the same time also brings a lot of trouble, that is network vulnerability safety problem, people in the process of download or chat may involve your privacy, the use of network vulnerabilities to steal personal information, so as to achieve their purpose, at the same time, Internet provide people with convenient service at the same time also brings the development of the network itself problems, such as excessively high network load network transmission speed slow people waste a lot of time, the emergence of these problems makes the network supervision and network management is particularly important, if you want to manage the network data will be to monitor data, to monitor the network data shows the data of the network data flow, in order to monitor the network data and data identification, this paper designed the network data recognition system to monitor and data, and that the flow of data and data content.This system USES the existing network environment and the basic use of existing network caught caught tools for network data, based on the TCP and UDP protocol analysis of network packets and decomposition, the content of the obtained data, this system is divided into several major part, one is the packet capture, the network data download and chat tools to grab the data transmission of data, downloaded to a local store. According to the data of the second part of the system is grasping the content of the packets of data for testing, according to the data of the kernel of data real-time detection. The third part is the analysis of the data, as well as the most important part of the whole system will be downloaded to the local disk data analysis and decomposition, according to the set in advance good principle for data analysis, thus draws the packet data transmission, so as to achieve the aim of data block and data analysis, so as to achieve the purpose of network supervision. Thus can be implemented to the network data block, current limit and so on, then the log output.
Keywords/Search Tags:application identification, LINUX, Data security, The data analy
PDF Full Text Request
Related items