Font Size: a A A

Research On The Technology Of Sensitive Email Monitoring Based On Proxy

Posted on:2016-10-03Degree:MasterType:Thesis
Country:ChinaCandidate:D W GuFull Text:PDF
GTID:2308330479490064Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the network, the using of e-mail is more widely, which plays an irreplaceable role in Internet communication and is the primary method of interaction in enterprise Internet, therefore it’s a vital problem that whether e-mail contain sensitive information. E-mail monitoring system is a system that monitoring on the Internet, in order to ensure the legitimacy of its content and transmission. Currently, most e-mail monitoring technology are in favor of the spam control, by analyzing the e-mail feature to determine the nature of the message, but that does not apply to the analysis of sensitive messages. And the current monitoring method is mainly through the bypass way, which have a relatively low reorganization rate.Bypass mail monitoring technique is implemented as network traffic analysis, discover the e-mail traffic, e-mail traffic reorganization, getting the message content by decode the e-mail, identify the sensitivity of e-mail, and control sensitive message transmission. There are two problems in bypass monitoring technique, the first is that there is packet loss problem in massive traffic situation, and the second is that by using interrupt method to block e-mail transmission will lead to retransmit, which will increase the load.To conquer the low recognition problem in bypass e-mail monitoring technique, we use a method based on proxy to monitor e-mail traffic, which get the e-mail traffic by proxy from other network traffic and will increase the recognition rate. We proposed a hybrid proxy method by analysis the SOCKS method and the HTTP method under the e-mail monitoring problemTo avoid retransmit in bypass e-mail monitoring technique, we substitute the sensitive content instead of block the e-mail, which will make the client thinks the e-mail has transmitted successful, therefore the client won’t retransmit the e-mail.After analysis the requirement of the sensitive e-mail monitor system, we split the system into functional blocks and designed and implemented every blo ck. In the end, we tested the system, primary the recognition rate and performance.The mainly result of this study is a sensitive e-mail reorganization method based on proxy, which provide an effective e-mail monitoring method in enterprise and other group.
Keywords/Search Tags:Hybrid proxy, E-mail, Pattern matching, Monitoring
PDF Full Text Request
Related items