Font Size: a A A

The Network Security Audit System Based On Gigabit Network

Posted on:2008-08-20Degree:MasterType:Thesis
Country:ChinaCandidate:Z Q ChengFull Text:PDF
GTID:2178360242967356Subject:Computer applications
Abstract/Summary:PDF Full Text Request
In order to ensure security of data on net, we must develop the corresponding security technology. The security audit system based on content could process and analyze data with no consciousness of clients under monitor. The information then is used by system manager to audit and analyze. So we can find the malfunctions as soon as possible and take action to fix them. Sometimes the information we get from net can help us predict the malfunction and bugs.This paper designs a framework of network security audit based on network sniffer which is suite for medium and big enterprise network environment. And then apply the framework into a real project. This paper contains several parts as following:Firstly, this paper introduces the research background and meaning, and then gives the objective of our research. In this paper some research from the aspects as system structure, data source and network service control concerned with network audit system has been done. And also analyze our audit system in detail.Secondly, this paper introduces the requirements under small-medium enterprise network environment. Then it gives the structure of the security audit system. According to functions, the system can be divided into several parts as data collection, data analyzing and processing, network service control and user interface. This paper focuses on several crucial technology used on data collection and storage, data analyzing and processing. After studying the existed crucial technologies, this paper gives a solution to the practical requirement of network security audit system.Then this paper gives the details of the implement of this audit system and shows a leveled protocol analysis model. In this model, the comparison and analysis among different common protocols are done. This model has a good reusability and expansibility by Standardizing interfaces and internal delamination.At last, this paper introduces the general implementation model of this security audit system, the functions and the implementation of the sub-function units. This System provides a good platform for network manager to audit. It could fit into different environment and serve for different user by different parameter settings.
Keywords/Search Tags:Information Audit, Zero Copy, Protocol Analysis, Network Monitoring
PDF Full Text Request
Related items