Font Size: a A A

The Design And Realization Of A Set Of Data Flow Analysis Blocking System Based On WDK Network

Posted on:2015-02-15Degree:MasterType:Thesis
Country:ChinaCandidate:H J WangFull Text:PDF
GTID:2308330452970281Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information industry in our country, the increasingpopularity of the Internet, the sharp increase of Internet users, and network securityincidents have occurred from time to time, from2013USA prism gate protagonistSnowden broke the USA "child prodigy" hacker army through the intrusion behaviorof long-term infiltration for15years, until2014January China network paralysisevent implemented by foreign hostile forces, and so on. Therefore, the importance andnecessity of the construction of information network security are fully embodied.In such situation, carrier forms and diversified network structures such as video,audio, webpage, forum, symbols, new social networking platform, all need large dataanalysis work. This study focuses on the identification of hacker attacks, foreigninfluence, protecting data from being illegally collected, detection of linking stateeffectively to prevent hacker’s XSS, Trojan attack known illegal behavior. The studytries to identify the attack information, block attacks in the huge network information,and protect the security of network information in a better way.This paper analyzes the features of the safety of information network and waysof hackers’attack behavior, referring to the domestic and foreign advanced experience,and the summary and analysis of its theory, from the angle of information networksecurity and network supervision department. The paper designs a set of data flowanalysis blocking system based on WDK network, which, by using the traditionalanalysis of the data package, designs high speed data stream processing corecombined with the NoSQL, and greatly improves the response and recognitionprocessing cycle. Flow analysis uses Cache coupling principle, and the processingspeed is several times than the traditional data warehouse analysis processing speed.By analyzing the business process and disposal method of Internet supervisiondepartment, deep treatment of detection and blocking the flow of data and testing forvalidity the system of the specific network environment, the paper gives detailedanalysis.
Keywords/Search Tags:information network security, network security, hacker attacks, WDK, streaming data
PDF Full Text Request
Related items