六赢伙伴
幼苗
共回答了18个问题采纳率:83.3% 举报
In today's society science and technology with each passing day. The rise of information technology is quietly changing people's life, study and work; However when people increasingly widespread application of Internet, all kinds of potential safety problems gradually emerge in front of the world; In order to effectively avoid these uncertain factors bring safe hidden trouble, network monitoring arises at the historic moment. Network monitoring is an emerging technology, its core is to effectively detect in view of the network transmission of data packets, capture, analysis, and then according to the analysis of information people can to avoid all sorts of network intrusion; So, the generation of the tool makes network security is more safe and reliable, and has the very high application significance. Based on network packet capture, packet through the analysis of the protocol to detect whether packets on the network aggressive this purpose. Several system are introduced in this algorithm, the key points out that the network traffic self-similarity principle of application; Attack after change the self-similarity of value through the network and the premise set Hurst value comparison, if change after the similarity value exceeded the Hurst, think network attack happened. This system design is simple, operation is convenient; Through the system call each other between sub-modules, further realize the network monitoring this goal, has the high practical significance.
1年前
9