网络嗅探技术探索与设计毕业论文 - 图文

发布时间 : 星期四 文章网络嗅探技术探索与设计毕业论文 - 图文更新完毕开始阅读

……………………. ………………. ………………… 装 订 线 ……………….……. …………. …………. ……… 山东农业大学

毕 业 论 文

题目: 网络嗅探技术探索与设计

院 部 信息科学与工程学院 专业班级 网络工程2班 届 次 2012届 学生姓名 学 号 20085265 指导教师

二О一 二 年 六 月 五 日

网络嗅探器技术探索与设计

Exploration and design of the network sniffer

专业 Speciality 学生

Undergraduate 指导教师 Supervisor

山东农业大学 二○一 二 年 六月 Shandong Agricultural University

June, 2012

网络工程

Network engineering

目 录

1 引言 .................................................................................................................................1 1.1 课题背景 ......................................................................................................................1 1.2 网络安全现状 ..............................................................................................................2 1.3 开发意义 ......................................................................................................................3 2关于网络嗅探 ..................................................................................................................4 2.1网络嗅探概念 ...............................................................................................................4 2.2以太网嗅探的原理 .......................................................................................................4 2.3 Winpcap 简介...............................................................................................................6 3 系统概述 .........................................................................................................................9 3.1 实现目标 ......................................................................................................................9 3.2 开发环境分析 ..............................................................................................................9 3.2.1 C++语言简介.............................................................................................................9 3.2.2 开发工具简介 ...........................................................................................................9 4 算法分析 ....................................................................................................................... 11 4.1各种类型报文对象的构造 ......................................................................................... 11 4.2过滤方法 .....................................................................................................................12 5 详细设计与实现 ...........................................................................................................14 5.1网络协议的分析与实现 .............................................................................................14 5.1.1数据链路层 ..............................................................................................................14 5.1.2网络层 ......................................................................................................................14 5.1.3运输层 ......................................................................................................................19 5.2数据包的捕获 .............................................................................................................22 5.3数据包的分析 .............................................................................................................24 5.4实现过程中的难点 .....................................................................................................26 5.5嗅探程序运行截图 .....................................................................................................27 6 总结 ...............................................................................................................................30 参考文献 ...........................................................................................................................31 致谢 ...................................................................................................................................32

Contents

1 Introduction ................................................................................... 错误!未定义书签。 1.1 Subject background .......................................................................................................1 1.2 Network security situation ............................................................................................2 1.3 Development of meaning ..............................................................................................3 2 Network sniffer.................................................................................................................4 2.1 The concept of network sniffer ...................................................................................4 2.2 Ethernet sniffing the principle .......................................................................................4 2.3 Winpcap Profile .............................................................................................................6 3 System Overview..............................................................................................................9 3.1 Goals..............................................................................................................................9 3.2 Analysis of development environment ........................................................................9 3.2.1 C + + Language Profile ..............................................................................................9 3.2.2 Development tool profile............................................................................................9 4 Algorithm analysis.......................................................................................................... 11 4.1 Various types of packets the object's constructor ........................................................ 11 4.2 Filtering methods.........................................................................................................12 5 Detailed design and implementation ..............................................................................14 5.1 Analysis and Implementation of network protocol .....................................................14 5.1.1 Data link layer ..........................................................................................................14 5.1.2 Network layer .........................................................................................................14 5.1.3 Transport layer .........................................................................................................19 5.2 Packet capture..............................................................................................................22 5.3 Packet analysis.............................................................................................................24 5.4 Realize the difficulty in the process ..........................................................................26 5.5 Sniffer program running Screenshot ...........................................................................27 6 Summary.........................................................................................................................30 References .........................................................................................................................31 Acknowledgement.............................................................................................................32

联系合同范文客服:xxxxx#qq.com(#替换为@)