The article is aimd at detecting whether the data package is aggresive to the network through protocol analysis on the basis of network data package capture. Applied for the self-similarity principle of network flow, the network aggresive shall be detected through the comparison between the attacked self-similarity value and set...