A network data security analysis method based on DPI technology
Title | A network data security analysis method based on DPI technology |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Wei, Li, Hongyu, Liu, Xiaoliang, Zhang |
Conference Name | 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS) |
Publisher | IEEE |
ISBN Number | 978-1-4673-9904-3 |
Keywords | artificial neural network, Artificial neural networks, Collaboration, computer network security, data content detection, data filtering, data legitimacy, data protocol, deep packet inspection (DPI) technology, deep packet inspection technology, DPI technology, Fingerprint recognition, governance, Government, Inspection, internetworking, Logic gates, matched filters, network data legality, network data security analysis, network servers, policy, policy-based governance, power system, power system security, protocol analysis, protocol matching, protocol parsing, Protocols, pubcrawl, Resiliency, security gateway, Servers, threat data, visiting data security |
Abstract | In view of the high demand for the security of visiting data in power system, a network data security analysis method based on DPI technology was put forward in this paper, to solve the problem of security gateway judge the legality of the network data. Considering the legitimacy of the data involves data protocol and data contents, this article will filters the data from protocol matching and content detection. Using deep packet inspection (DPI) technology to screen the protocol. Using protocol analysis to detect the contents of data. This paper implements the function that allowing secure data through the gateway and blocking threat data. The example proves that the method is more effective guarantee the safety of visiting data. |
URL | http://ieeexplore.ieee.org/document/7883228/ |
DOI | 10.1109/ICSESS.2016.7883228 |
Citation Key | wei_network_2016 |
- protocol matching
- network data legality
- network data security analysis
- network servers
- Policy
- policy-based governance
- power system
- power system security
- protocol analysis
- matched filters
- protocol parsing
- Protocols
- pubcrawl
- Resiliency
- security gateway
- Servers
- threat data
- visiting data security
- deep packet inspection technology
- Artificial Neural Networks
- collaboration
- computer network security
- data content detection
- data filtering
- data legitimacy
- data protocol
- deep packet inspection (DPI) technology
- artificial neural network
- DPI technology
- Fingerprint recognition
- Governance
- Government
- Inspection
- internetworking
- Logic gates