Font Size: a A A

Research On Monitoring Technology Of Information Security Based On Intelligent Agent Technology

Posted on:2010-02-22Degree:MasterType:Thesis
Country:ChinaCandidate:L Q YangFull Text:PDF
GTID:2178360275485579Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the popularization of computer, the development of Internet and the continuous increase of netizen, Network is convenient to many people at the same time also brought a range of issues. The traditional network security problems included the computer virus, the account number to be robbed, the hacker invasion and the malicious website and so on. Compared to traditional network security issues, vulgar Phenomenon, disclosure of confidential, even Engaged in criminal activities in the economy with Network Technology become the new threat of Network security. Faced with these situations, a lot of enterprises, Government, Educational institutions and Financial institutions need to monitor and control the network security of Intranet. In order to satisfy this kind of request, this dissertation put forward a kind of network information security audit system to carry out a project, and concretely designed the security of information node. This equipment developed on the base of the CPU of the Intel x86 frame and Linux system. It provides a new technical way to resolve the problem of the information security audit for the Intranet users.Starting with Analysis of Network Security, the status of network security and common application of network monitoring technology, this paper build the security monitoring system of network information based on Intelligent Agent technology, which was arranged as bypass mode. NET-1711VD4N network platform was used to build a Linux-basedhardware environment. It has carried out the protocol analysis from the link layer, the network layer, the transport layer until the application layer, system software was completed on this basis, concretely analyzed the HTTP protocol , POP3 protocol of the application layer. The program contained five modules: the network data packet capture module, the network protocol analysis module, real-time TCP blocking for the contrary information alarm, the contrary information alarm module and the database storage module. In this paper, it mainly realized the network data package capture technology, the protocol analysis technology, matching contrary information based on Intelligent Agent technology and blocking technology of real-time TCP connection.The system was arranged in a Internet caféof QingDao city. When trigger conditions were met, the results of capturing information of HTTP protocol, POP3 protocol and real-time TCP connection's blocking was realized.
Keywords/Search Tags:Linux, network security, protocol analysis, real-time TCP connection blocking
PDF Full Text Request
Related items