期刊文献+

基于P2P的远程控制系统设计与实现 被引量:2

Design and Implementation on Remote Control System based on P2P Network
在线阅读 下载PDF
导出
摘要 近年来,NAT(网络地址转换)技术在很大程度上缓解了IP地址资源短缺的问题,但却给互联网上主机之间的通信带来了障碍,使得传统远程控制技术受到限制。文章围绕P2P穿越NAT设备并实现远程控制的若干问题进行研究,首先分析了当前主流的NAT穿越技术,并以此为基础,提出一套远程控制方案,然后使用JAVA语言对该方案予以实现。实验结果表明,文章提出的方案能够有效实现远程控制的功能。 Recently, NAT(network address translation) technology has largely alleviated the shortage of IP resource problems, but creates a communication barrier between the hosts on the Internet, which limits the traditional remote control technology. This paper studies a number of issues focusing on P2P(peer to peer) traversing NAT equipment and firstly analyses the mainframe NAT traversal technology. On this basis, the remote control program is proposed and the program is achieved by JAVA language. The experimental results show that the program proposed in this paper can achieve remote control effectively.
出处 《信息网络安全》 2014年第3期32-38,共7页 Netinfo Security
基金 国家自然科学基金[61170282]
关键词 远程控制 NAT 穿越 P2P peer-to-peer remote control communication across Network Address Translators
  • 相关文献

参考文献6

  • 1康治平,向宏,傅鹂.基于API HOOK技术的特洛伊木马攻防研究[J].信息安全与通信保密,2007,29(2):145-148. 被引量:4
  • 2Ting Liu, Xiaohong Guan, Qinghua Zheng, Ke Lu, Yuanfeng Song, Weizhan Zhang. PrototypeDemonstration: Trojan Detection and Defense System[C].In: Consumer Conununications and NetworkingConference, 2009. CCNC 2009:1-2.
  • 3J. Rosenberg, J. Weinberger, C. Huitema, R. Mahy, STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)[R].Network Working Group, RFC3489, March 2003.
  • 4J. Rosenberg, R. Mahy, P. Matthews, D. Wing,Session Traversal Utilities for NAT (STUN) [R]. Network Working Group, RFC5389, October 2008.
  • 5B. Ford, P. Srisuresh, D. Kegel, Peer-to-Peer (P2P) communication across middleboxes[EB/OLl.http://nlidcom- p2p.sourcetbrge.net/draft- ford-midcom-p2p-01 .txt, October 2003.
  • 6P. Matthews, J. Rosenberg, J. Rosenberg, Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN) [R]. Network Working Group, RFC5766, April 2010.

二级参考文献5

  • 1[1]API HOOKing Revealed.http://www.codeguru,com/ Cpp/W-P/system/misc/article.php/c5667,2006 (6).
  • 2[2]Yariv Kaplan.API Spying Techniques for Win-dows 9x,NT and 2000,http://www.internals.com/articles/apispy/apispy.htm,2006(6).
  • 3[3]Jeffrey Richter.Programming Applications for Microsoft Windows.USA:Microsoft Press,2000:515-564.
  • 4[4]Greg Hoglund,James Butler.Rootkits:Subverting the Windows Kernel.Addison Wesley Professional.2005.
  • 5[5]kernel inline HOOK绕过vice检测.http://www.xfocus.net/articles/200511/832.html.

共引文献3

同被引文献56

  • 1王宇,卢昱.信息网络安全脆弱性分析[J].计算机研究与发展,2006,43(z2):326-331. 被引量:5
  • 2王锦生.喷墨打印机打印文件检验[J].刑事技术,1998,23(4):21-23. 被引量:10
  • 3马继刚.当前文件检验的热点问题[J].中国司法鉴定,2007(1):47-50. 被引量:4
  • 4张宇.企业网防火墙的设计与实现[J].中小企业管理与科技,2007(11):62-63. 被引量:4
  • 5吴清海,韩毅,夏鸣.文检技术在行政执法中的应用[M].南京:江苏科学技术出版社,2007.
  • 6Gebhardt J, Goldstein M, Shafait F, et al. Document Authenticationusing Printing Technique Features and Unsupervised AnomalyDetection[C] //12th International Conference on Document Analysis andRecognition, Piscataway, 2013:479-483.
  • 7Lampert C H, Mei L, Breuel T M. Printing Technique Classificationfor Document Counterfeit Detection[C]//International Conference onComputational Intelligence and Security, Guangzhou, 2006: 639 - 644.
  • 8Umadevi M, Agarwal A, Rao R. Printed Text Characterizationfor Identifying Print Technology using Expectation MaximizationAlgorithm[C]//Multi-disciplinary Trends in Artificial Intelligence,Hyderabad, 2011, (7080): 201-212.
  • 9Tchan J. Classifying Digital Prints According to Their ProductionProcess using Image Analysis and Artificial Neural networks[C]//TheInternational Society for Optical Engineering, San Jose, 2000:105-116.
  • 10Tchan J. The Development of an Image Analysis System ThatCan Detect Fraudulent Alterations Made to Printed Images[C]//TheInternational Society for Optical Engineering, San Jose, 2004:151-159.

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部