Font Size: a A A

Research Of Network Packet Sniffing And Network Attack Technology Based On Web

Posted on:2018-11-01Degree:MasterType:Thesis
Country:ChinaCandidate:S R YuFull Text:PDF
GTID:2348330542953933Subject:Pattern Recognition and Intelligent Systems
Abstract/Summary:PDF Full Text Request
With the development of network,the problems of security have been increasingly emerging,and inexhaustible network vulnerabilities are constantly threatening the security of network.As a result,network vulnerability mining,as well as network protocol security analysis,have gradually become eye-catching in the field of network researching.As the common methods in the process of network security analyzing,network data capture,network data analysis and network attack,are of great significance to the analysis of network protocol security.This thesis aims at researching on the related technologies of network protocol security analysis,which includes network data capture,protocol parse,protocol reverse and fuzzing.The widely used technologies of data capture have been studied in the first place,and the methods of data capture have been optimized and redesigned according to the specific demands in this thesis.Secondly,network traffic identification technology and network protocol analysis technology are studied,which is used to identify and parse the data.As for the data which can not be identified or parsed,protocol reversing analyzing technology of network protocol is applied to identify the format field of the data partly.At last,the thesis studies and uses the fuzzing technology to attack the target server as a test for the security of the network protocol.Based on this,a network protocol security testing platform is designed based on Web,which use B/S structure to achieve remote management of this system by Web.The test results show that the platform can capture network data effectively.The type of the protocol is identified and the frame format of the protocol isparsed in real-time.The part format of the unknown protocol can be effectively reversed.Effectively mining vulnerabilities in the server.
Keywords/Search Tags:data capture, traffic identification, protocol parsing, protocol reverse, fuzzing
PDF Full Text Request
Related items