Font Size: a A A

Research On Identification Technology Of Abnormal Traffic And Network Protocal

Posted on:2016-08-10Degree:MasterType:Thesis
Country:ChinaCandidate:B DingFull Text:PDF
GTID:2308330464467963Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of network technology, the problem of network security has become the shortest board. The paper takes the vulnerability of security threat as the studying object, From the essence of the security threat to find out the detection method, and to study the corresponding vulnerability scanning platform. In this paper, the detection method of attack graph is proposed to detect the unknown network attack behavior.The target of the vulnerability scanning platform is the accuracy of the scan. In the paper, the main vulnerabilities are divided into system vulnerabilities, application vulnerabilities and protocol vulnerabilities. In the method of vulnerability scanning, The principle of vulnerability analysis to detect vulnerabilities to Improve the accuracy of vulnerability scanning.The detection method of attack graph is proposed in this paper, Analyzing the attack behavior in the target environment. The attack behavior is multi-step and hiding, but each step has a certain causal relationship. In this paper, the probability detection model of attack intent is constructed, which can effectively detect the unknown vulnerabilities.The paper designs the detection method of the vulnerability scanning platform and the unknown security risk, and makes the safety factor of the target environment increased, and has the strong practical significance.
Keywords/Search Tags:Abnormal traffic, APT, Protocol analysis, Vulnerability analysis, DDos
PDF Full Text Request
Related items