Font Size: a A A

Internet Application Protocol Analyzing Of Next Generation Internet Firewall

Posted on:2015-10-12Degree:MasterType:Thesis
Country:ChinaCandidate:H WuFull Text:PDF
GTID:2298330434950509Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, the network characteristics of the Internet application is becoming more and more complicated.At the same time, more and more threats comefrom the application layer.Traditional firewall based on IP and port number of traffic identification method has struggled to cope with it, creating the next generation network firewall based on application layer network traffic identification.At present domestic next generation network firewall has no thoroughsignaturedatabase, and support of the scale and application identification precision are not ideal.At the same time, someforeign advanced next generation network firewall arelowon the application of the domestic mainstream network support. For this reason, the project starts to the next generation network firewall application layer protocol analysis, classification and building of network protocol signaturedatabase.Signature database mainly support most of the domestic mainstream network application and functions.The author is responsible for six classification of the signature database network application protocol analysis and application signature extraction, and participates in the development of the mobile terminal application signature extraction system. The author is responsible for the Android application information crawl, apk package download and analytical of apk package including design and code implementation. Other supporting work includes classification research of mainstream PC Internet applications and traffic generate and usage research of network game, agent software, stock futuressoftwareand office meeting software.The final application protocol signature database is more than expect in internal testing and successfully passed the Beta testing under the environment of network traffic of more than one Beta users. It further improves the recognition rate and recognition precision of network applications with improving theapplication support scale at the same time. After the actual product launch, recognition of the signature database has a excellent and stable performance and gets high praise of productusers.
Keywords/Search Tags:Firewall, Network protocol analysis, Signature database, Recognition ofapplication
PDF Full Text Request
Related items