透過您的圖書館登入
IP:3.145.93.221
  • 學位論文

在Libnids中TCP封包重組之改進

Improvement of TCP Packet Reassembly in Libnids

指導教授 : 黃士殷

摘要


網際網路的快速發展,使得網路安全的監控和防範受到了高度的重視,許多網路監控系統最重要的目的就是網路安全的防範,因此目前有很多網路安全工具和軟體可以進行監控,例如:常見的Snort等軟體。這些網路監控系統都是由許多API library為基礎來開發而成,像是運用libpcap來進行封包擷取、使用libnet來做封包的修改以及利用libnids來進行封包重組等。許多監控系統中,常用到libnids來進行封包擷取、IP分段重組、TCP資料串流重組等功能並將封包還原為原始的資料,但是在被動式網路監控的情形下,libnids在封包擷取時已不具有封包可靠的傳輸機制,因此更易發生封包遺失或是無法擷取成功的情況。然而,在libnids進行TCP資料串流重組時,若遇到封包遺失或無法擷取成功的狀況時,則無法繼續解析後來已到的封包。因此,本研究將改進libnids在進行TCP資料串流重組時的處理程序,在重組的過程中加入一個packet dispatch機制,讓libnids在等待遲遲不來的封包一段時間後,可繼續往下重組已先到來的封包,此外,更可避免系統消耗大量動態記憶體來儲存已先到來而無法被重組還原的封包。最後,本研究會將重組完成的封包在添加封包標頭資訊往上傳送至應用層加以處理繼續解析,利用封包各種資訊可助於獲得更多有用的網路資訊做到更有效率的網路管理。

並列摘要


Internet’s growing quickly makes the monitor and protect about the Internet security have become more important. The most important thing about monitor system design is to protect the internet security, so there is a lot of tool and software that we can use to monitor the internet. Most of these monitoring systems are designed basis on the API’s library, such as the libcap to capture the packets and the libnids to reassemble packets. Most of the monitoring system usually use the libnids to capture the packet, IP defragmentation, and TCP stream reassembly. When using the libnids to reassembly the TCP data stream, if the situation about packet loss and capture unsuccessful happened, that will fail to continue analyzing following packets. So, we will improve the procedure of libnids in TCP stream reassembly by add a interrupt waiting mechanism. Packet dispatch mechanism make the libnids been waiting for a period of time, it can continue o analyze following packets. In addition, libnids will avoid consuming a lot of memory to store following packets that can’t be reassembly. Finally, we will deliver packets with packet header informations to the application layer for get more useful network information to make the network management.

參考文獻


[3] J. Postel, “Internet Protocol,” RFC 791, 1981
[4] J. Postel, “Transmission Control Protocol,” RFC 0793, 1981
[6] Shaiful Jahari Hashim, Kasmiran Jumari, Mahamod Ismail, “Computer network intrusion detection software development,” TENCON 2000. Proceedings, Vol. 3, 24-27 Sept. 2000, pp. 117-123
[7] V. Paxson, M. Allman, “Computing TCP's Retransmission Timer,” RFC 2988, 2000
[9] Zhibin Zhang, Li Guo, Binxing Fang, and Xiaojun Chen, “Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach,” Performance, Computing, and Communications Conference, 2007. IPCCC 2007. IEEE Internationa

被引用紀錄


Chiang, M. C. (2016). 行動裝置在臨床醫療應用:以神經內科頭痛記錄為例 [master's thesis, Tamkang University]. Airiti Library. https://doi.org/10.6846/TKU.2016.00212
莊子清(2009)。探討醫療品質資訊公開化對消費者就醫行為知覺相關性研究〔碩士論文,元智大學〕。華藝線上圖書館。https://doi.org/10.6838/YZU.2009.00046
賴仕涵(2011)。網路醫病互動對精神科診所患者之影響〔碩士論文,臺北醫學大學〕。華藝線上圖書館。https://doi.org/10.6831/TMU.2011.00070
蕭若蘭(2010)。以脈絡地圖法探討嬰兒健康照護學習平台之開發與研究〔碩士論文,國立臺中科技大學〕。華藝線上圖書館。https://doi.org/10.6826/NUTC.2010.00024
詹如晴(2004)。應用問題導向學習於可共享之健康醫學教育網路學習教材〔碩士論文,臺北醫學大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0007-1704200714571035

延伸閱讀