Font Size: a A A

Design And Implementation Of The Oversight Of The Auditing System Of Internal Network Behavior

Posted on:2005-04-15Degree:MasterType:Thesis
Country:ChinaCandidate:D Y HeFull Text:PDF
GTID:2208360122981592Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the rapid development of computer networks, global communications with widespread open net environments have become the dominant trend in the future. There are inevitably some potential security problems while the Internet is providing open or share resources. Therefore, security problems of network become a focus of attention and research. There are many network security techniques, which can solve security problems from respective aspect. The essence of network security is how to protect the data resource especially in inner network or network involved secret. Therefore, as far as control the behaviors of data processing, it is successful to protect data resource and implement the data security.On the basis of the P2DR network security model, the paper discusses design and implementation of the Inner Network Behaviors Monitor & Audit System (for short NBAMS). In the inner network, NBAMS monitors the behaviors of network based on the centralized management and distributed control, and provide the audit for the behaviors.The research work mentioned in the paper is mainly about:(1) It analyzes the problems and solutions of network security generally.(2) It discusses the P2DR network security model and theory system. From the aspects of protecting, detecting and responding it discusses that NBAMS protects wholly data resources and NBAMS provides the speedy responding and good security performance.(3) It describes the design and implement ion of NBAMS, which comprises the function design, logical framework, communications protocol and implementation of pivotal modules, which also discusses the security and efficiency of NBAMS.(4) It describes the function test, stability test, feedback of users application and authentication test.
Keywords/Search Tags:network security, P2DR, behaviors monitor, secret network
PDF Full Text Request
Related items