Font Size: a A A

Design And Implementation Of A Network Monitoring Platform For Trojan And Botnet

Posted on:2017-03-17Degree:MasterType:Thesis
Country:ChinaCandidate:N WangFull Text:PDF
GTID:2348330515965320Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet,network security has become an increasingly serious problem.Driven by interests,a lot of people to steal others' information,destruction of others,deceive others property for the purpose of,released on the network with a lot of harm of Botnet,Trojans,worms,of network security caused great harm.Various government agencies website,the major portals have become the target of hacker attacks,as well as the blind pursuit of interests,the outbreak of security incidents showed an increasing trend year by year.Therefore,the development of effective security measures,is the primary goal of network and information security.Trojan and corpse network monitoring platform is a kind of intrusion detection system based on network,system is in order to develop the corresponding security strategy,monitoring and analysis of network traffic,network filtering harmful information,so as to achieve purpose of purifying network.The system has the function of real-time analysis and processing of data packets,the function of the dead wood creep identification,the function of traffic monitoring and alarm,and the function is strong,and it has a very high application value.This paper focuses on how to design and build a set of Trojan and botnet monitoring platform.First of all,the paper provides the function of the Trojan and botnet monitoring platform.The Trojan and botnet monitoring platform is a network based intrusion detection system,which determines the risk events on the network by grasping and analyzing the data packets.The system mainly has the monitoring and analysis,the stiff wood creep characteristic library,the flow collection,the gathering and streaming,the network management these five big function modules.According to these five functions,the corresponding implementation scheme is designed.Finally,the system was tested,and the system has the ability to discover,capture and dispose of the worm virus.
Keywords/Search Tags:Intrusion detection, feature database, traffic acquisition
PDF Full Text Request
Related items