Dissertation > Excellent graduate degree dissertation topics show

Research and Implementation of Protocol Identification Based on Regular Expression

Author: FanHuiPing
Tutor: XuanLei;ChenShuZuo
School: National University of Defense Science and Technology
Course: Computer Science and Technology
Keywords: Network Security Protocol identification Non-deterministic finite automata (NFA) Deterministic finite automata (DFA) Regex State transition table
CLC: TP393.08
Type: Master's thesis
Year: 2007
Downloads: 304
Quote: 3
Read: Download Dissertation


Current , high - speed network content auditing , intrusion detection and other security technology generally requires content analysis of network traffic in order to reach the level of the application layer protocol identification . The emergence of more and more new network protocol , making traditional the port identification methods have been unable to ensure the correctness of the identification . For this reason , the current protocol identification research turned statistics with model - based method and the based on reported stylistic detection method , and the correctness of these two methods than the port identification method has been greatly improved , but its recognition speed can not meet the backbone the requirements of the link . Therefore, the protocol identification based on regular expressions , a combination of hardware and software systems , to improve the correctness of the protocol identification and processing speed . Papers to complete the work : 1) In order to improve the correctness of the protocol identification , in the L7-filter regular expression based on the analysis of actual traffic agreement Edonkey, BT and QQ expression were modify , experiments show that the modified regular expressions are better able to meet the actual needs ; 2) DFA regular expression matching and improve the matching speed . Thompson algorithm based on the classic regular expressions compiled into NFA basis through the compression ε constructor algorithm for the empty side of NFA , compression , and then the use of classical subset construction algorithm , the NFA converted to DFA , the tests show that the method not only speed up the NFA compiled into a DFA speed , but also improves the matching speed protocol identification ; 3 ) One-Pass matching algorithm the DFA matching scan algorithm , and L7-filter , the agreement matching speed ; 4) the matching engine algorithms implemented in hardware design , the DFA transformed into state transition table stored in the SRAM , and proposed based on a regular expression protocol identification of single packets matching simulation tests show that the algorithm improves the protocol identification matching speed . The method proposed in this paper in the accuracy and performance of the protocol identification than currently popular L7-filter has been greatly improved . The research results have been used in the actual project and interim acceptance testing the correctness and handling performance to achieve the requirements of the project indicators .

Related Dissertations

  1. Region-based wireless sensor network key management scheme for research,TP212.9
  2. E-Government Network Security Analysis and Prevention Strategy,TP393.08
  3. Public IP-based Digital Video Surveillance System and Its Implementation,TP277
  4. Application of Data Mining in Intrusion Detection System,TP393.08
  5. Campus Network Research and Design for Middle Vocational School,TP393.18
  6. Research and Implementation on Access Control for Intranet Terminal Based on Policy,TP393.08
  7. Design and Implementation of the campus network security management system,TP393.18
  8. Intranet Information Security Protection System Design and Implementation,TP393.18
  9. Network intrusion detection technology in data mining algorithm,TP393.08
  10. Design and Implementation of the campus network intrusion detection system,TP393.18
  11. Online banking authentication and network design and implementation of security mechanisms,TP393.08
  12. Study and Application on Instruction Detection System of the Security Management of Jiangxi Province Local Tax Bureau,TP393.08
  13. Packet-based feature zombie Trojan detection technology,TP393.08
  14. Global Security Network Design and Implementation,TP393.08
  15. Research on Decision Tree Web Application Authentication of Individual,TP393.02
  16. The Design of Campus Network Distributed Intrusion Detection System Based on Snort,TP393.08
  17. The Design and Implement for the Security Platform of Qingdao Municipal E-government Affair,TP393.08
  18. Research on Fusion Technology of Multi-source Log Secure Information,TP393.08
  19. Research and Implement of Network Security Assessent,TP393.08
  20. Research on Extension of Web Service to Support QoS,TP393.09
  21. Application of Support Vector Machine in the Intrusion Detection,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile