摘要(英) |
Nowadays the instant messenger has become an indispensable Internet communication tool, the instant messenger software makes people feel convenient but also creates a big loophole in the network security. With the popularity of the instant messenger, the company has to face up to variaous questions which the instant messenger brings.
In the past, many companies used some blocking ways to avoid staffs using the instant messenger to divulge the company secret, like closing communication port...etc. But with the evolution of the instant messenger software, some old methods cannot keep the users from the messengers. In this thesis, we discuss detection of instant messengers by different way. We analyze the characteristics of various instant messengers and their behavior patterns. We train the instant messenger detection system by using the support vector machine. In the future, our research results can be a basis for the monitoring, side recording and obstruction of the instant messenger. |
參考文獻 |
[1] Microsoft, http://www.microsoft.com/
[2] AIM, http://www.aim.com/
[3] Yahoo Messenger, http://tw.messenger.yahoo.com/
[4] Yam QQ, http://qq.yam.com/
[5] ICQ, http://www.icq.com/
[6] B. Campbell, et. al, " Session Initiation Protocol (SIP) Extension for Instant Messaging", RFC 3428, December 2002.
[7] Day, M., Rosenberg, J. and H. Sugano, "A Model for Presence and Instant Messaging", RFC 2778, February 2000.
[8] Day, M., Aggarwal, S. and J. Vincent, "Instant Messaging /Presence Protocol Requirements", RFC 2779, February 2000.
[9] ITU, http://www.itu.int/ITU-T/
[10] Rosenberg, J., et. al, "SIP: Session Initiation Protocol", RFC 3261, June 2002.
[11] Skype, http://www.skype.com/
[12]V. Vapnik, "The nature of statistical learning theory. Springer",1995
[13] R. Movva and W. Lai, "MSN Messenger Service 1.0 Protocol", Internet Draft, draft-movva-msn-messenger-protocol-00.txt, August, 1999
[14] Chih-Chung Chang and Chih-Jen Lin, LIBSVM, http://www.csie.ntu.edu.tw/~cjlin/libsvm/
[15] Binh Viet Nguyen, "An Application of Support Vector Machines to Anomaly Detection.",Research in Computer Science – Support Vector Machine ,Fall 2002
[16] Burges C. "A Tutorial on Support Vector Machines for Pattern Recognition. " Data Mining and Knowledge Discovery, 1998,2(2): 121-167. |