Font Size: a A A

Research On Method Of Electronic File Security Based On Router

Posted on:2018-07-20Degree:MasterType:Thesis
Country:ChinaCandidate:Z W JiangFull Text:PDF
GTID:2348330512497929Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
With the development of computer technology and Internet technology,electronic documents have been deep into all aspects of people's lives,becoming an important carrier of information in life.At the same time,from the enterprise to the individual,electronic file network leaked events caused by the important information was stolen when the economic losses caused by the increasingly serious.How to protect the electronic file network leak,has become one of the research focus in the field of file security.Based on the data flow analysis of anti-electronic file network mechanism,this paper puts forward the idea of electronic file security protection based on router.The main work is as follows:1.The analysis of a variety of common protocol network transmission of various formats and types of electronic file data packets,extract the HTTP protocol,FTP protocol,TFTP protocol,TCP protocol,SMTP protocol network transmission electronic file eigenvalues,and then through the extracted The eigenvalue design and construction of the feature database,the final design of the characteristics of the database matching data flow ideas,as a router-side electronic file security protection based on the characteristics of matching.2.Analysis of the router above the realization of electronic file security protection program,build OpenWRT + SQLite router platform environment,the realization of the feature database embedded in the router.3.The router based on the electronic file security protection for the overall analysis and functional division,through the router based on the PHP + Nginx server platform to achieve the operation of the characteristics of the database and view the log web page.4.Through the use of Linux kernel network protocol stack on the outbound router to capture the data packets;using port mapping based on the protocol identification technology to achieve the data stream identification and feature extraction;the use of AC multi-pattern matching algorithm to achieve data flow characteristics and database characteristics Value to compare and match;use Netflter framework to achieve data flow network block;use SQLite to achieve electronic file network leak log records.
Keywords/Search Tags:electronic document, characteristic database, security protection, dataflow
PDF Full Text Request
Related items