期刊文献+

即时通讯软件文件传输审计系统的研究与实现 被引量:3

Research and implementation of files audit system for instant messenger
下载PDF
导出
摘要 已有的网络行为审计软件没有针对即时通讯软件(IM)的文件传输记录模块。通过搭建协议分析环境,根据主流即时通讯软件通信数据明文传输的特点,利用网络捕包工具,并采用逆推方法,对多种即时通讯软件(IM)(QQ,Fetion,MSN和雅虎通等)文件传输协议进行深入分析,设计并实现一个IM文件传输审计系统(FAudit)。FAudit系统基于Libpcap库捕获数据包,提取应用层数据,应用特有的文件重组算法,通过计算网络数据包的ACK和SEQ数,对数据包进行过滤、排序、解压、重组和写入,最后还原出用户传输的文件。测试结果表明:FAudit系统可在不同网络环境特别是网络环境突变、网络状况异常恶劣的情况下,有效地审计各类IM传输的各种类型(DOC,PDF,TXT和视频等)和大小的文件,同时还可解决即时通讯软件版本升级带来的系统升级问题。 Since most network behavior audit software cannot record files sent by instant messenger (IM), based on the exoteric communication data between popular instant messenger client softwares, using sniffer tools, the unopened and non-uniform file transmitting protocols of those software were analyzed in converse way. And a new network behavior audit system (FAudit) was presented on the base of analysis on IMs files transmission protocol. As IMs file packets were captured based on Libpcap database, application layer data was extracted, the ACK number and SEQ number were analyzed, and then the packets were recovered from the original file by filtering ordering, decompression, reassembling and writing. The simulation results show that FAudit can audit all formats of files (such as DOC, PDF, TXT and videos) with arbitrary size in different network environments no matter however bad it is. At the same time FAudit can be extended to other kinds of IMs.
出处 《中南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第10期3872-3878,共7页 Journal of Central South University:Science and Technology
基金 国家自然科学基金资助项目(60873265) 新世纪优秀人才支持计划项目(NCET-10-0798)
关键词 即时通 文件传输 协议分析 审计 文件重组算法 SEQ数 instant messenger files transmission protocol analysis audit files reassembly algorithm SEQ number
  • 相关文献

参考文献15

  • 1李远杰,刘渭锋,张玉清,梁力.主流即时通软件通信协议分析[J].计算机应用研究,2005,22(7):243-245. 被引量:23
  • 2O'Sullivan S. Instant messaging vs. instant compromise[J]. Network Security, 2006(7): 4-6.
  • 3Lib/Chun-kuan. A study of monitoring technologies in instant messen_ger[EB/OL]. [2011-06-15]. http://thesis.lib.ncu.edu.tw/ETD- db/ETD-search/getfile?URN--93523042&filename--93523042.pdf.
  • 4Xiao Z, Guo L, Tracey J. Understanding instant messaging traffic characteristics[C]//Proc of 27th International Conference on Dislfibuted Computing Systems. Toronto: IEEE Press, 2007: 51-58.
  • 5LILT Zhi-jun, LIN Wei-li, LI na, et al. Detecting and filtering instant messaging spam-a global and personalized approach[C]// Proc of lst/EEE ICNP Workshop on Secure Network Protocols. Boston, USA: IEEE Press, 2005: 9-24.
  • 6Kim S. Implementation of the security system for instant messengers[J]. Journal of Systems and Software, 2007, 80(10): 1590-1593.
  • 7黄红桃,彭宏,吴健培,黄剑峰.基于MSN协议的网络行为审计系统的设计与实现[J].计算机工程,2007,33(15):255-257. 被引量:4
  • 8付安民,张玉清.即时通实时监控系统的设计与实现[J].通信学报,2008,29(10):165-172. 被引量:4
  • 9Day M, Rosenberg J, Sugano H. RFC2778: A model for presence and instant messaging[S].
  • 10马严.IPV6下基于SIP/SIMPLE协议IM的研究与实现[D].北京:北京邮电大学计算机学院.2009:5-42.

二级参考文献24

  • 1胡振宇,刘在强,苏璞睿,冯登国.基于协议分析的IM阻断策略及算法分析[J].电子学报,2005,33(10):1830-1834. 被引量:5
  • 2阎瑜,殷梅.网络监管的三个根本性问题[J].传媒,2006(3):42-43. 被引量:7
  • 3OSULLIVAN S. Instant messaging vs. instant compromise[J]. Network Security, 2006, (7):4-6.
  • 4GU H. Security of instant message[EB/OL], http://www.cs. auck- land.ac.nz/courses/compsci705slc/assignments/Student ResearchReports/ SecurityOfIM%20Hui%20Gu.pdf.
  • 5MANNAN M, OORSCHOT P C. Secure public instant messaging: a survey[A]. Proceedings of the Second Annual Conference on Privacy, Security and Trust[C]. 2004.69-77.
  • 6FRASE D. The instant messaging menace: secttrity problems in the enterprise and some solutions[EB/OL], http://www.sans.org/reading_ room/whitepapers/threats/479.php,
  • 7LIN C K. A study of monitoring technologies in instant messenger[EB/OL], http:/Ithesis.Hb.ncu.edu.twlETD-db/ETD-search/getfile? URN=93523042&filename=93523042.pdf.
  • 8XIAO Z, GUO L, TRACEY J. Understanding instant messaging traffic characteristics[A]. 27th International Conference on Distributed Computing Systems[C]. 2007.51-58.
  • 9LIU Z J, LIN W L, LI N, et al. Detecting and filtering instant messaging spam- a global and personalized approach[A]. 1st IEEE ICNP Workshop on Secure Network Protocols[C]. 2005.19-24.
  • 10SANGKYUN K, CHOON S L. Implementation of the security system for instant messengers[A]. The International Symposium on Computational and Information Sciences (CIS'04)[C]. 2004.739-744.

共引文献35

同被引文献6

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部