Font Size: a A A

The Design And Implementation Of Security Inspection System In LAN

Posted on:2004-06-25Degree:MasterType:Thesis
Country:ChinaCandidate:D Y FuFull Text:PDF
GTID:2168360122992945Subject:Earth Exploration and Information Technology
Abstract/Summary:PDF Full Text Request
Specialty: Earth Exploration and Information TechnologyMajor : Computer network technologyThe safe and security of network information has related to the important problems of the safe and sovereignty of a country, social steadiness, inheritance and development of national culture.. Viewed from the technology, the safe and security of network information is a borderline synthetical subject concerned with computer science, network technology,cipher technology, safe technology, artificial intelligence, information theory, etc. With the rapid development of internet network and information has been the important characters nowadays. Network information nearly becomes the synonym of time, wealth and productive forces. But every coin has two sides, so does network.. As network technology becomes popular and network information brings good news to human being, it is like another open Pandora's box, which produces kinds of intruding actions and criminal offenses on account of network information. Thus people more and more attach importance to network safe, and inspection to network attack and protection of information more and more becomes the subject for professional personnel to study.The thesis describes the common network attack types as well as research condition of network intruding inspection system, and analyses the basic theory of network data packets transfer on account of Protocol TCP/IP, and finally discusses network safe system framework on account of P2DRR , which takes Linux operating system as the development platform, has c as the development tool, uses libpcap as a tool to capture network data packets, and decode according to various protocols, along with the preprocess function on account of such inspection as I/O port scanning, and analyses the misuse inspecting technology deeply on account of key word mode matching, and studies theory abnormal inspecting system on account of data mining. The inspecting and output function of the whole system is designed as mold in plug-mechanism, so as to transplant and extend the system.After the thesis analyses and studies the network intruding inspection system, I recognize the design and development of network safe inspecting system basically and systematically, which makes solid foundation for further study and research , meanwhile, brings forward some suggests to protect our network information safe from the point practically, and prospects network information inspection and protection on technology.
Keywords/Search Tags:LAN, Net Security, P2DDR Module, Misuse Detecting, Anomaly Detecting, IDS, Linux Programming, C Programming, Libpcap, TCP/IP, Data Mining
PDF Full Text Request
Related items