基于內(nèi)容的網(wǎng)絡(luò)行為分析
[Abstract]:In modern society, people's daily life is more and more inseparable from the network. The Internet is a part of our study, life and work. It even changes people's daily life habits and characteristics. However, the development of the Internet brings great convenience to people, at the same time, it also provides a way for virus, Trojan horse, network attack and so on to affect the network security, so how to purify the network environment, It is urgent to protect the information security of users. In the past, the research on network security mainly focused on how to ensure the confidentiality of information, but now the research on network security has developed to the security of system services, such as our common network security systems, including application firewalls. Intrusion detection system, antivirus system, etc. Most of these systems are based on traditional methods, only analyzing the packet headers, but many attacks are hidden in the contents of the packets. This paper uses the content-based network behavior analysis method to perfect the traditional analysis method. In this paper, the main research object is network data packets, and the network access behavior of network data packets is analyzed by content characteristics. The main research contents include four aspects: the research of network packet capture technology, the research of content-based abnormal behavior, the design and construction of network behavior signature library and the research of efficient matching of network behavior. At the end of the paper, the test of the system design scheme is carried out. The practical results show that the method based on data packet content analysis can accurately judge whether the packet has abnormal behavior, which can detect the network vulnerability. Common attacks and research on preventive measures are of great significance.
【學(xué)位授予單位】:北方工業(yè)大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 張婷婷;趙京勝;;一種基于神經(jīng)網(wǎng)絡(luò)的入侵檢測系統(tǒng)研究[J];計算機(jī)安全;2010年08期
2 李晶皎;陳勇;許哲萬;陸振林;;入侵檢測中字符匹配系統(tǒng)的FPGA實(shí)現(xiàn)[J];東北大學(xué)學(xué)報(自然科學(xué)版);2013年03期
3 宗常進(jìn);畢軍濤;董軍宇;;基于離散小波變換的信號分解算法研究[J];計算機(jī)工程與應(yīng)用;2009年08期
4 王偉平;李昌;段桂華;;基于正則表示的SQL注入過濾模塊設(shè)計[J];計算機(jī)工程;2011年05期
5 王建國;鄭家恒;;BM串匹配算法的一個改進(jìn)算法[J];計算機(jī)工程與科學(xué);2007年05期
6 曾小薈;冷明;劉冬生;李平;金士堯;;一個新的SYN Flood攻擊防御模型的研究[J];計算機(jī)工程與科學(xué);2011年04期
7 李雪梅,代六玲,童新海,李莉;一種串匹配的快速Boyer-Moore算法[J];計算機(jī)應(yīng)用研究;2005年09期
8 張紅梅;范明鈺;;模式匹配BM算法改進(jìn)[J];計算機(jī)應(yīng)用研究;2009年09期
9 潘文嬋;章韻;;Wireshark在TCP/IP網(wǎng)絡(luò)協(xié)議教學(xué)中的應(yīng)用[J];計算機(jī)教育;2010年06期
10 伊靜,劉培玉;入侵檢測中模式匹配算法的研究[J];計算機(jī)應(yīng)用與軟件;2005年01期
,本文編號:2354771
本文鏈接:http://www.sikaile.net/guanlilunwen/ydhl/2354771.html