首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
基于WinPcap的网络安全监控系统的设计与实现   总被引:5,自引:0,他引:5  
数据包捕获技术是设计网络分析软件的基础,而WinPcap则是在Windows系统中实现的一个优秀的包捕获架构。文中结合该软件包的结构与功能对包捕获原理进行了详细的分析,并介绍了其在网络安全监控系统设计中的应用。该系统的基本原理是通过调用WinPcap库捕获本地网络上的所有数据包,然后对数据包进行协议解码,从而可以实时地监视网络,自动发现网络故障并报警。局域网使用结果表明此系统稳定,效果较好。  相似文献   

2.
基于WinPcap的数据包捕获及应用   总被引:4,自引:1,他引:3  
网络数据包捕获是进行网络分析的基础,通过对Windows操作系统平台下网络数据包捕获模型的论述,重点对基于NDIS的优秀包捕获开发包WinPcap的结构和功能的进行了详细的介绍和分析,实现了如何在VC 6.0环境下借助WinPcap提供的各个接口函数对网卡进行编程进而对网络数据包进行捕获和分析的方法,最后突出叙述了数据包捕获在网络分析中的应用.  相似文献   

3.
网络数据包捕获技术是网络安全维护的基础技术和核心手段,是利用计算机技术截获网络上的数据包,并对截获到数据包进行分析。文章探析了WinPcap基本原理和组成。阐述了利用WinPcap技术在Windows下捕获数据包的方法。  相似文献   

4.
WinPcap[1]系统是一个功能强大的用于网络数据获取的开发包,为程序员提供了一套标准的网络数据包捕获接口,它直接作用于网卡,获取数据链路层的数据,能捕获数据链路层的所有数据包。该文概述了WinPcap的内部结构,简要介绍了WinPcap捕获数据包的实现原理,详细分析了实现WinPcap捕获数据包的过程。  相似文献   

5.
大多数的Unix系统都提供一组称为Libpcap的系统调用,为用户空间的数据包捕获提供便利.WinPcap将这些功能移植到Win32平台下并增加了一些新的特性.本文描述WinPcap体系结构的细节并给出基于WinPcap程序的一般设计.  相似文献   

6.
针对目前的网络安全问题,设计并实现了基于WinPcap的网络数据解析系统。介绍了WinPcap的结构组成,论述了基于WinPcap的网络数据包的捕获过程,以及TCP/IP协议下数据包的解析原理,最后给出了实验结果。  相似文献   

7.
WinPcap在网络监控和流量分析等方面应用广泛,该文对WinPcap数据包捕获系统的结构及其主要功能作了详细的分析,并用MFC对其进行封装,实现了WinPcap数据包捕获在VisualBasic中使用的功能。  相似文献   

8.
利用基于Win32平台的抓包和网络分析开源库WinPcap,结合Java类库Jpcap,设计并实现一个校园局域网安全监控系统。该系统不但可以捕获、分析并存储数据包,还可使捕获的数据包以表格的形式展现,从而方便网络管理员的管理。给出其软件的设计和实现细节,实践证明该系统是有效的。  相似文献   

9.
网络已经成为人类生活中不可或缺的重要组成部分,网络信息的安全问题也越来越被人们所重视。通过基于网络数据包的协议分析,对网络上传输的数据包进行捕获,可以获取网络上传输的非法信息,对网络取证的研究非常有利。WinPcap是一种提供在Windows系统上进行访问底层网络数据的Windows API;它不是一种纯粹的C++解决方案,它依赖本地库的使用。借助WinPcap提供的网络数据包捕获函数库,利用c++编程实现了数据包捕获和过滤算法。  相似文献   

10.
基于Windows的网络监听技术在局域网中的实现   总被引:4,自引:0,他引:4  
赵海雁  陈立潮  叶树华 《计算机工程》2004,30(22):117-118,124
讨论了在Windows操作系统环境下网络监听技术的原理,给出了依据包过滤技术实现网络监听的基本步骤与方法.利用WinPcap开发包,实现了对网络底层数据包的捕获。  相似文献   

11.
This article describes the rationale for the multiphase creative problem solving process, and reports the findings from an empirical investigation conducted to facilitate the problem solving of managers. The ideational skills of the managers were assessed before and after training in a complete process of creative problem solving, along with their ideational attitudes, creative problem solving style (i.e., generator, conceptualizer, optimizer, or implementor), and evaluative skill (i.e., ability to recognize original ideas). The most important findings indicated that the training had a significant impact on the evaluative accuracy of the managers. They were significantly more accurate in their judgments about original ideas after training, both in their identification of original ideas and their recognition of unoriginal ideas. After training, the managers also gave more solutions and more original solutions to problems. Finally, several variables (e.g., the “preference for active divergence” attitude, and the conceptualizer process style) seemed to moderate the impact of training. Training was therefore effective, with specific effects that can be predicted from pre-training individual differences in attitudes and process style.  相似文献   

12.
13.
The deep connection between the Burrows–Wheeler transform (BWT) and the so-called rank and select data structures for symbol sequences is the basis of most successful approaches to compressed text indexing. Rank of a symbol at a given position equals the number of times the symbol appears in the corresponding prefix of the sequence. Select is the inverse, retrieving the positions of the symbol occurrences. It has been shown that improvements to rank/select algorithms, in combination with the BWT, turn into improved compressed text indexes.  相似文献   

14.
15.
16.
17.
18.
为发现我国国家标准与国外发达国家标准法规的差距,从根本上提高我国国家标准的总体质量,提升我国产品的质量安全水平,以关键指标(因子)为核心,研究国内外标准法规比对的工作流程,利用面向对象的方法设计,实现了国内外标准法规比对分析系统。该系统适用于所有产品国内外标准法规的比对工作。  相似文献   

19.
20.
In this paper we present a sound and complete semantics for the monitor concept of C.A.R. Hoare. First a method for specification of monitors, introduced by O.-J. Dahl, is reviewed. This method is based on the relation between the historic sequence of monitor procedure calls and the historic sequence of monitor procedure exits. Based on such specifications and our new monitor semantics we present a method by which it is possible to prove that a concrete monitor is an implementation of an abstract one. In the last part of the paper an axiomatic semantics for systems of concurrent processes and monitors is introduced. The method supports verification by separation of concerns: Properties of the communication to and from each process are proven in isolation by a usual Hoare style axiomatic semantics, while abstract monitors are also specified in isolation by the method reviewed in the first part of the paper. These properties of the components of the system are then used in a new proof rule to conclude properties of the complete system. Stein Gjessing received a Ph.D. (actually a Dr. philos.) from the University of Oslo (Norway) in 1985. Presently he is an Associate Professor at the Institute of informatics, University of Oslo, Norway. Dr. Gjessings research interests are in the area of concurrent and distributed programming, operating systems, formal specification and verification and programming languages.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号