{$cfg_webname}
主页 > 计算机 > 网络 >

基于sFlow的网络安全威胁感知研究

来源:wenku163.com  资料编号:WK16313642 资料等级:★★★★★ %E8%B5%84%E6%96%99%E7%BC%96%E5%8F%B7%EF%BC%9AWK16313642
资料介绍

基于sFlow的网络安全威胁感知研究(任务书,开题报告,论文10000字)
摘  要
在信息技术飞速发展的今天,互联网络已经成为人们日常生活和工作站必不可少的一部分,是信息化社会的基础设施和基本保障。随着当代网络技术的不断提高,互联网在人们生活、社会活动以及经济发展等方面的影响蒸蒸日上,同时,网络面临的安全威胁也在日益趋于复杂化,如何实时监控网络情况,提高网络的安全性、可靠性和可用性是一严峻的挑战。
论文通过对网络安全威胁感知中存在的相关问题和需求,研究了基于不同理论和技术的网络安全威胁感知的方法,对各种方法在应用的便利性、资源消耗等方面进行了分析对比。论文着重研究了基于sFlow技术的网络威胁感知,通过与其他技术对比,说明sFlow技术的凭借其永远在线的特点以及其出色的全网监控能力,在成本低廉的同时,获取到链路层、网络层、传输层和数据包头信息等丰富的数据信息,为网络安全威胁感知研究提供良好的数据基础,以进行后续的数据分析,从而实现网络安全威胁的实时感知。
论文最后通过实验验证了基于sFlow技术的流量监控在网络安全威胁感知以及中的优势和重要作用。
关键词:安全威胁感知;sFlow;流量监控

Abstract
Today, with the rapid development of information technology, the Internet has become an indispensable part of People's Daily life and workstations. It is the infrastructure and basic guarantee of the information society.With the continuous improvement of modern network technology, the Internet in people's life, social activities and the influence of economic development progresses day by day, at the same time, the network security threats are also increasingly tend to be complicated, how to real-time monitoring network, improve network security, reliability and availability is a severe challenge.
Paper based on the problems existed in network security threat awareness of and demand, based on different theories are studied and the technical method of network security threat awareness, convenience, on the application of the various methods in the aspects such as resource consumption is analyzed andcompared.Paper focuses on the network based on the technology of sFlow threat perception, compared with other techniques, illustrate sFlow technology with its characteristics of online forever and its excellent tech-oriented monitoring ability, at the same time of low cost, access to the data link layer, network layer, transport layer, and baotou rich data such as information, provide good data for the research on network security threat awareness, with subsequent data analysis, so as to realize the real-time of network security threat perception.
Finally, the paper verifies the advantages and important role of flow monitoring based on sFlow technology in network security threat perception.
Key Words:security threat perception;sFlow;flow monitoring
 

基于sFlow的网络安全威胁感知研究
基于sFlow的网络安全威胁感知研究


目录
第1章 绪论    2
1.1 选题的背景和意义    2
1.1.1 选题研究背景    2
1.1.2 选题意义    3
1.2 国内外研究现状    4
1.3 本文结构    5
第2章 基于sFlow的网络安全威胁感知研究    7
2.1 sFlow技术概述    7
2.1.1 sFlow数据特征    9
2.1.2 sFlow采样机制    10
2.2 sFlow实现网络安全威胁感知    11
2.2.1 常见网络攻击行为分析    11
2.2.2 威胁感知方法    12
第3章 实验及结果分析    14
3.1 实验环境部署    14
3.1.1 sFlow虚拟机配置    14
3.1.2 Mininet虚拟机配置    15
3.1.3 Floodlight虚拟机配置    17
3.1.4 整体实验环境搭建    18
3.2 攻击事件模拟实验    23
第4章 总结与展望    25
4.1 总结    25
4.2 现状与展望    25
致谢    26
参考文献    27

推荐资料