Font Size: a A A

The Design And Implementation Of Audit System Based On The Restored HTTP Protocol Content

Posted on:2015-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:Z W WangFull Text:PDF
GTID:2348330542952500Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the progress of social,more and more people begin to focus on Internet.The development of the Internet is very fast,just like the development of the geometric.Now people and Internet are closely linked together,however the information of Internet not only provides convenience to people,but also burieds the dangerous seeds to people.Many bad guys use the Internet to transact some illegal information or malicious software,these behavior damage the interest of the people who surf the internet.Sometimes people's privacy information is stealed,these illegal behavior bring much distress to people.With Snowden telling the global people what the USA government do to them,the security of the Internet is more and more series.Now the government and the company for Internet security are both designing a system to defend such attack of illegal Internet using.The traditional methods,like not allow the employee surf or not allow people to use the USB,play a role in defending the attack to Internet.But at this century,not allowing people surf the web is a stupid method.We can use another methods to protect the security of the Internet,because peole always use the E-mail or HTTP to transact information.These way can be controled.So the monitoring to the custom of some special company or people is very useful for us to design the audit system.What this paper mainly do is to implement a system which can audit the Baiduyun cloud download page.In order to achieve this goal,we must implement a system which can restore HTTP protocol.Under the system we can audit the restore content of web,so that to kill the tcp link which has the illegal information.The another work of this paper is to static and analyze the traffic of the web images.Of course,this module is also based on the restore system.This article mainly does the research on the HTTP protocol,so the majoy work is all related to HTTP protocol.As we must implement the audit based on traffic and the audit based on content,so the resore of the HTTP protocol is the first wo must to do.Since this paper was written based on the actual project,so in order to achieve the final demand,we need to restore the HTTP protocol and analyze the restore content.So that we can proceed with the next audit which based on the content of the HTTP protocol.In this paper,we implement a module which can audit the content of th download pages,this module is based on the web content audit.The other module which can static the traffic of the web pages is based on the traffic audit method.Those two module both have the representative,they can be extended to the traffic of video or audio.The main work of this paper are as follows:programming for implementng the network packet capture in real time,so we can analyze real-time,control real-time,these behavior have played a significant role;doing much research on the HTTP protocol,these provide theory data for subsquent processing;studied and realized correlation algorithm for IP fragment reassembly and TCP stream reassembly techniques;to extract the captured packets and analyze HTTP protocol;implemented a module to kill the illegal tcp link;implemented a web Images traffic statistics plugin based on traffic statistics.After the completion of the subject,we tested the system,we can blocking Baiduyun cloud download harmful pages and complete a analysis report for picture traffic statistics.
Keywords/Search Tags:Protocol Restore, Content Audit, HTTP, Traffic Statistics
PDF Full Text Request
Related items