
Целью работы ÑвлÑетÑÑ Ð¸ÑÑледование возможноÑти Ð¾Ð¿Ñ€ÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¿Ð°Ñ€Ð°Ð¼ÐµÑ‚Ñ€Ð¾Ð² Ñетевых уÑтройÑтв на оÑнове анализа дампов Ñетевого трафика. Предметом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑŽÑ‚ÑÑ Ð·Ð°Ð³Ð¾Ð»Ð¾Ð²ÐºÐ¸ пакетов, которые ÑпоÑобны предоÑтавить информацию о уÑтройÑтвах Ñети. Задачи, решаемые в ходе иÑÑледованиÑ: 1. Изучить ÑущеÑтвующие методы Ð´ÐµÑ‚ÐµÐºÑ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¸ Ð¿Ñ€Ð¾Ñ„Ð¸Ð»Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ Ñетевых уÑтройÑтв; 2. Ð’Ñ‹Ñвить признаки потенциально пригодные Ð´Ð»Ñ Ð²Ñ‹ÑÐ²Ð»ÐµÐ½Ð¸Ñ Ñетевых уÑтройÑтв и их характериÑтик; 3. Разработать ÑпоÑобы и ÑредÑтва обработки дампов Ñетевого трафика протокола IPSEC Ð´Ð»Ñ Ð¾Ð¿Ñ€ÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ñ…Ð°Ñ€Ð°ÐºÑ‚ÐµÑ€Ð¸Ñтик Ñетевых уÑтройÑтв; 4. ПровеÑти ÑкÑпериментальные иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¸ оценить ÑффективноÑть методов Ñ Ð¸Ñпользованием выÑвленных признаков; 5. ПровеÑти анализ полученных результатов и оценить возможноÑти Ð¿Ñ€Ð¸Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð²Ñ‹Ñвленных признаков Ð´Ð»Ñ Ð¾Ð¿Ñ€ÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ñ…Ð°Ñ€Ð°ÐºÑ‚ÐµÑ€Ð¸Ñтик Ñетевых уÑтройÑтв на оÑнове анализа дампов Ñетевого трафика. Ð’ ходе работы была иÑÑледованы принципы работы и Ñтруктура заголовков протокола IPsec. Ð’ результате работы был разработан алгоритм Ð´ÐµÑ‚ÐµÐºÑ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ ÑƒÑтройÑтв в Ñети по дампу трафика защищенным протоколом IPsec, была продемонÑтрирована ÑффективноÑть метода. Полученные результаты могут быть иÑпользованы в качеÑтве оÑновы Ð´Ð»Ñ Ð¿Ñ€Ð¾ÐµÐºÑ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ ÑиÑтем паÑÑивной разведки Ñети.
The purpose of the work is to investigate the possibility of the determining the characteristics of network devices based on the analysis of network traffic dumps. The subject of the study is certain packet headers that are able to provide information about network devices. The research set the following goals: 1. Studying the existing methods of detecting and profiling network devices. 2. Identify the features that are potentially suitable for identifying network devices and their characteristics. 3. Developing ways and means of processing IPSEC network traffic dumps to determine the characteristics of network devices. 4. To conduct experimental studies and evaluate the effectiveness of methods using the identified features. 5. Analyze the results obtained and evaluate the possibilities of using the identified features to determine the characteristics of network devices based on the analysis of network traffic dumps. In the course of the work, the principles of operation and the structure of IPsec protocol headers were investigated. As a result of the work, an algorithm was developed for detecting devices in the network by traffic dump using the IPsec secure protocol, and the effectiveness of the method was demonstrated. The results obtained can be used as a basis for designing passive network intelligence systems.
ÑеÑевой ÑÑаÑик, Ð´Ð°Ð¼Ð¿Ñ ÑÑаÑика, network trafic, devise profiling, пÑоÑилиÑование ÑÑÑÑойÑÑв, деÑекÑиÑование ÑÑÑÑойÑÑв, devise detection, traffic dumps
ÑеÑевой ÑÑаÑик, Ð´Ð°Ð¼Ð¿Ñ ÑÑаÑика, network trafic, devise profiling, пÑоÑилиÑование ÑÑÑÑойÑÑв, деÑекÑиÑование ÑÑÑÑойÑÑв, devise detection, traffic dumps
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
