天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

網(wǎng)絡(luò)滲透的HTTP通信分析研究

發(fā)布時(shí)間:2018-11-29 07:26
【摘要】:互聯(lián)網(wǎng)和計(jì)算機(jī)技術(shù)的高速發(fā)展給人們的生活帶來(lái)了許多便利,同時(shí)也為網(wǎng)絡(luò)犯罪分子提供了更多的犯罪手段,信息安全問(wèn)題日益突出。網(wǎng)絡(luò)滲透可以作為評(píng)估網(wǎng)絡(luò)系統(tǒng)安全性的一種方法,也可以作為公安機(jī)關(guān)偵察犯罪活動(dòng)、收集證據(jù)的手段。木馬是一種常見(jiàn)的以控制用戶主機(jī)和盜取用戶隱私為目的的病毒,完善木馬檢測(cè)技術(shù)和提高木馬識(shí)別率對(duì)保障用戶的財(cái)產(chǎn)和隱私安全具有現(xiàn)實(shí)意義。本文對(duì)網(wǎng)絡(luò)滲透的HTTP通信進(jìn)行了分析研究,研究?jī)?nèi)容包括: (1)研究網(wǎng)絡(luò)滲透的HTTP通信方法。通過(guò)對(duì)防火墻等網(wǎng)絡(luò)安全設(shè)備的原理進(jìn)行分析,研究了基于HTTP通信的防火墻穿透技術(shù);通過(guò)對(duì)網(wǎng)絡(luò)嗅探器、網(wǎng)絡(luò)連接查看器和網(wǎng)絡(luò)流量查看器三種類型的網(wǎng)絡(luò)安全檢測(cè)軟件進(jìn)行分析,研究了網(wǎng)絡(luò)滲透中網(wǎng)絡(luò)活動(dòng)的隱藏方法;基于對(duì)HTTP數(shù)據(jù)傳輸方式的研究,構(gòu)建了網(wǎng)絡(luò)滲透的HTTP通信規(guī)則;基于上述研究的方法完成了基于HTTP通信的網(wǎng)絡(luò)滲透系統(tǒng)。 (2)研究HTTP木馬的網(wǎng)絡(luò)通信分析檢測(cè)模型。對(duì)基于HTTP進(jìn)行通信的木馬和普通程序產(chǎn)生的HTTP網(wǎng)絡(luò)通信數(shù)據(jù)進(jìn)行了分析,并在此基礎(chǔ)上提取出HTTP木馬的六個(gè)網(wǎng)絡(luò)通信行為特征;綜合利用層次聚類、Davies-Bouldin指數(shù)和k-means算法建立了一個(gè)HTTP木馬檢測(cè)模型,該模型僅用于檢測(cè)基于HTTP進(jìn)行通信的木馬。 (3)設(shè)計(jì)實(shí)驗(yàn)對(duì)本文提出的網(wǎng)絡(luò)滲透的HTTP通信方法和HTTP木馬檢測(cè)模型的可行性進(jìn)行驗(yàn)證。實(shí)驗(yàn)結(jié)果表明,本文的HTTP通信方法能夠穿透網(wǎng)絡(luò)防火墻的防護(hù),成功隱藏了自身的網(wǎng)絡(luò)活動(dòng),并能夠提供可靠的數(shù)據(jù)傳輸;HTTP術(shù)馬的網(wǎng)絡(luò)通信分析檢測(cè)模型能夠有效的檢測(cè)出HTTP木馬,準(zhǔn)確率較高,誤報(bào)率較低。 本文通過(guò)研究網(wǎng)絡(luò)滲透的HTTP通信,提出了一種網(wǎng)絡(luò)滲透的HTTP通信方法,它能夠提高網(wǎng)絡(luò)滲透中通信的穿透性和隱蔽性。同時(shí),本文構(gòu)建的HTTP木馬檢測(cè)模型對(duì)典型的HTTP木馬具有較高的識(shí)別率,它可以作為對(duì)現(xiàn)有木馬檢測(cè)方法的補(bǔ)充。
[Abstract]:The rapid development of Internet and computer technology has brought a lot of convenience to people's life, at the same time, it also provides more criminal means for network criminals. The problem of information security is becoming more and more prominent. Network penetration can be used as a method to evaluate the security of network system, as well as a means for public security organs to detect criminal activities and collect evidence. Trojan horse is a kind of common virus which is aimed at controlling the user's host computer and stealing user's privacy. It is of practical significance to improve the Trojan horse detection technology and improve the Trojan horse identification rate to ensure the user's property and privacy security. In this paper, the HTTP communication of network penetration is analyzed and studied. The main contents are as follows: (1) the HTTP communication method of network penetration is studied. By analyzing the principle of network security equipment such as firewall, the firewall penetration technology based on HTTP communication is studied. Through the analysis of three types of network security detection software, network sniffer, network connection viewer and network traffic viewer, the hiding method of network activity in network penetration is studied. Based on the research of HTTP data transmission mode, the HTTP communication rules of network penetration are constructed, and the network penetration system based on HTTP communication is completed based on the above research methods. (2) the network communication analysis and detection model of HTTP Trojan horse is studied. This paper analyzes the HTTP network communication data generated by the Trojan horse and the ordinary program based on HTTP, and extracts the six network communication behavior characteristics of the HTTP Trojan horse. Based on hierarchical clustering, Davies-Bouldin index and k-means algorithm, a detection model of HTTP Trojan horse is established, which is only used to detect Trojan horse based on HTTP. (3) the experiment is designed to verify the feasibility of the HTTP communication method and the detection model of HTTP Trojan horse proposed in this paper. The experimental results show that the HTTP communication method in this paper can penetrate the protection of network firewall, hide its network activities successfully, and provide reliable data transmission. The network communication analysis and detection model of HTTP can effectively detect HTTP Trojan horse with high accuracy and low false alarm rate. In this paper, by studying the HTTP communication of network penetration, a HTTP communication method of network penetration is proposed, which can improve the penetration and concealment of network penetration. At the same time, the HTTP Trojan detection model constructed in this paper has a high recognition rate for typical HTTP Trojan horses, which can be used as a supplement to the existing Trojan detection methods.
【學(xué)位授予單位】:北京化工大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08

【參考文獻(xiàn)】

相關(guān)期刊論文 前6條

1 易軍凱;劉健民;萬(wàn)靜;;一種基于網(wǎng)絡(luò)行為分析的HTTP木馬檢測(cè)模型[J];北京化工大學(xué)學(xué)報(bào)(自然科學(xué)版);2014年03期

2 孔政;姜秀柱;;DNS欺騙原理及其防御方案[J];計(jì)算機(jī)工程;2010年03期

3 饒孟良;蔡皖東;丁要軍;;基于SVM的HTTP隧道檢測(cè)技術(shù)研究[J];計(jì)算機(jī)工程;2011年13期

4 孫海濤;劉勝利;陳嘉勇;孟磊;;基于操作行為的隧道木馬檢測(cè)方法[J];計(jì)算機(jī)工程;2011年20期

5 易軍凱;陳利;孫建偉;;網(wǎng)絡(luò)心跳包序列的數(shù)據(jù)流分簇檢測(cè)方法[J];計(jì)算機(jī)工程;2011年24期

6 孫吉貴;劉杰;趙連宇;;聚類算法研究[J];軟件學(xué)報(bào);2008年01期



本文編號(hào):2364316

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2364316.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶fb974***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com
国产成人精品一区二区三区| 日本高清不卡一二三区| 粉嫩国产美女国产av| 熟女体下毛荫荫黑森林自拍| 国产传媒精品视频一区| 精品女同在线一区二区| 美国女大兵激情豪放视频播放| 国内九一激情白浆发布| 欧美日韩免费观看视频| 激情图日韩精品中文字幕| 中文字幕日韩精品人一妻| 中文字幕人妻日本一区二区| 日本免费一本一二区三区| 中文字幕一区二区免费| 麻豆欧美精品国产综合久久| 亚洲一区二区三区在线中文字幕| 果冻传媒精选麻豆白晶晶 | 中国少妇精品偷拍视频| 亚洲高清欧美中文字幕| 国产精品偷拍一区二区| 一二区中文字幕在线观看| 日本一区二区三区久久娇喘| 91麻豆视频国产一区二区 | 老外那个很粗大做起来很爽| 国产精品美女午夜视频| 熟妇人妻av中文字幕老熟妇| 少妇熟女精品一区二区三区| 视频在线播放你懂的一区| 九九热九九热九九热九九热| 亚洲精品国产第一区二区多人| 在线观看免费视频你懂的| 日本加勒比在线播放一区| 日韩特级黄片免费在线观看| 日韩人妻中文字幕精品| 中文字幕中文字幕一区二区| 99久久精品国产日本| 亚洲天堂精品在线视频| 国产精品一区二区三区欧美| 91欧美日韩精品在线| 日韩性生活片免费观看| 日韩1区二区三区麻豆|