Font Size: a A A

Control System Design, Based On Bypass Internet Content Blocking Technology

Posted on:2009-07-17Degree:MasterType:Thesis
Country:ChinaCandidate:Q MaFull Text:PDF
GTID:2208360272489546Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of Internet, the category and quantity of the information on Internet are rising rapidly. Among the Internet information, much is bad news, like the reactive free press, pirated editions, obscene and violent contents. How to control and manage the information while guarantee the users to freely enjoy the Internet, becomes more and more important and necessary. But there are still some disadvantages in the internet filtering system existing now in China, such as the unstable performance, complex operation, and easy odd malfunction. Therefore, in order to build the healthy and civilized Internet environment, it has become one important task in the informationized development in our country to construct a high capable and easy-run content controlling system for Internet.Firstly, it is analyzed the present conditions of the content controlling system of Internet, pointing out the shortage of the traditional internet managing software, clear about the function position and system core flow of the content controlling system with the technology of bypass interdiction. Based on it, an analysis about the overall structure is made, and the development of front server, URL spider subsystem, policy serve subsystem, and policy manage subsystem is designed with details. Among it, it is focused to discuss the development method of promoting the front server performance of the core subsystem, that is, the equipment is linked to the Internet with bypass way, and by sending out spurious data packages to cheat the protocol stack, the linkage appears to be abnormal, thought by both of the communication parties. Then the linkage is blocked, and the filtering of communication contents as well as internet behaviors, and the controlling of Internet content, are realized at last.
Keywords/Search Tags:By-pass, promiscuous mode, protocol analysis, TCP/IP deceit
PDF Full Text Request
Related items