期刊文献+

基于协议分析的IM阻断策略及算法分析 被引量:5

On the Policy and Algorithm to Block Instant Messaging
下载PDF
导出
摘要 本文根据即时通讯(IM)的协议模型,在TCP层和即时通讯协议层分析了阻断即时通讯的可能性,分别提出了基于TCP层和即时通讯协议层的协议分析的阻断策略.在TCP层,通过插入FIN报文或RST报文,以关闭TCP连接(特别是与登录服务器的连接);在即时通讯协议层,通过对相应字段的值进行设置,使客户端进入不活动状态.为使阻断策略能够有效地实施,本文也提出了一个消息驱动的实现算法.通过对Yahoo!Messenger的阻断实验,证明了本文提出的方法能够高效地完成阻断任务(平均数据包量不超过2.5个).用统计分析的方法对它们的性能进行比较,结果表明各种方法的效率在不同的背景流量下没有显著的差异,通过消息驱动算法实现的基于协议分析的阻断策略,其工作效率不受背景流量的影响.另外,即时通讯数据的触发方式,使得发送的阻断包的数量与背景流量无关,也不对网络负载造成明显的影响.本文的工作为实施即时通讯的阻断提供了有效的解决方案. Depending on the general protocol model, this paper analyzed the possibility of blocking Instant Messaging (IM) at TCP layer and IM protocol layer respectively.At TCP layer, packets of FIN or RST were inserted to close a TCP connection;at IM protocol layer, certain commands with special flag were inserted to enforce a client to be idle. To implement these blocking policies effectively, a message-driven algorithm was offered, too. Some experiments to block Yahoo! Messenger and their statistical analyses were also presented in this paper. The results showed that all the policies implemented through the message-driven algorithm block IM effectively, their performances are independent of the back traffic, and thus, they don't impose much burden on the whole Internet. The works done in this paper provided practicable and effective solutions to block IM.
出处 《电子学报》 EI CAS CSCD 北大核心 2005年第10期1830-1834,共5页 Acta Electronica Sinica
基金 国家863高技术研究发展计划(No.2003AA142150)
关键词 即时通讯 P2P 威胁 协议 阻断 block instant messaging(IM) peer-to-peer(P2P) protocol threat
  • 相关文献

参考文献7

  • 1Neal Hindocha and Eric Chien.Malicious Threats and Vulnerabilities in Instant Messaging[OL].Symantec Security Response WHITE PAPER,http://securityresponse.symantec.com/avcenter/reference/malicious.threats.instant.messaging.pdf.
  • 2Neal Hindocha.Threats to Instant Messaging[OL].Symantec Security Response WHITE PAPER,http://securityresponse.symantec.com/avcenter/reference/threats.to.instant.messaging.pdf.
  • 3Symantec Corporation.Securing Instant Messaging[OL].Symantec white paper,March 6,2003.http://securityresponse.symantec.com/avcenter/reference /secure.instant.messaging.pdf.
  • 4Dan Frase.The Instant Messaging Menace:Security Problems in the Enterprise and Some Solutions[OL].http://www.sans.org/rr/whitepapers/threats/479.php.
  • 5R Movva,W Lai.MSN Messenger Service 1.0 Protocol[OL].August,Microsoft,1999.http://www.hypothetic.org/docs/msn/ietf-draft.php.
  • 6Venkat,Yahoo Messenger Protocol(ver 10)[EB/OL].2003,http://www.venkydude.com/articles/yahoo.htm.
  • 7Alexandr Shutko,OSCAR(ICQ v7/v8/v9)protocol documentation[EB/OL].2005,http://iserverd1.khstu.ru/oscar/families.html.

同被引文献53

  • 1李远杰,刘渭锋,张玉清,梁力.主流即时通软件通信协议分析[J].计算机应用研究,2005,22(7):243-245. 被引量:23
  • 2郑有才,张光华,张玉清.即时通信息监听技术的研究与实现[J].计算机应用研究,2005,22(8):113-116. 被引量:7
  • 3李千目,许满武,严悍,张宏.一种网络拥塞预测新方法[J].系统仿真学报,2006,18(8):2101-2104. 被引量:5
  • 4金婷,王攀,张顺颐,陆青莲,陈东.基于DPI和会话关联技术的QQ语音业务识别模型和算法[J].重庆邮电学院学报(自然科学版),2006,18(6):789-792. 被引量:10
  • 5OSULLIVAN S. Instant messaging vs. instant compromise[J]. Network Security, 2006, (7):4-6.
  • 6GU H. Security of instant message[EB/OL], http://www.cs. auck- land.ac.nz/courses/compsci705slc/assignments/Student ResearchReports/ SecurityOfIM%20Hui%20Gu.pdf.
  • 7MANNAN M, OORSCHOT P C. Secure public instant messaging: a survey[A]. Proceedings of the Second Annual Conference on Privacy, Security and Trust[C]. 2004.69-77.
  • 8FRASE D. The instant messaging menace: secttrity problems in the enterprise and some solutions[EB/OL], http://www.sans.org/reading_ room/whitepapers/threats/479.php,
  • 9LIN C K. A study of monitoring technologies in instant messenger[EB/OL], http:/Ithesis.Hb.ncu.edu.twlETD-db/ETD-search/getfile? URN=93523042&filename=93523042.pdf.
  • 10XIAO Z, GUO L, TRACEY J. Understanding instant messaging traffic characteristics[A]. 27th International Conference on Distributed Computing Systems[C]. 2007.51-58.

引证文献5

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部