Font Size: a A A

Hardware Control. Internal Network Security Research And Realization

Posted on:2008-11-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y H L OuFull Text:PDF
GTID:2208360215950009Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As the rapid development of computer technology and the wide using of the networks, most enterprises use computers as the main tool for managing information and data. It makes the enterprises run more efficient but also bring in some security problems. So it's important to raise the security level and to keep its convenience.So far, all the researches on this area are focus on CD/DVD-ROM+/-RW, floppy drive, COM/LPT and USB devices.But most of them can only simply forbid or shield those devices in users'mode, which lead to coarse control granularity.This dissertation is the author's theory sum-up and improvement after joining in the development of an intranet security management subject which is based on Windows operating systems. It's made up of clients, servers and control panels, and provides cipher protection, files security, state monitoring and system resource management.The system has to be based on Windows driver architecture, especially the WDM which is a kind of driver of PNP devices. So the author had a deep research on WDM architecture, theory and programming technology. and programmed the drivers with lots of tools such as Windows DDK, Driver Studio and so on.The following are the author's mainly work during the research:1. Not only provides completely forbidding mode, but also the read-only and written-only mode. Can fit all kinds of users'demands.2. Control the devices in the kernel mode, takes little time to run. The whole dissertation is organized like this: analyzes the background and the research situation of this topic first. Demonstrates the design of the intranet security management system and how the modules communicate with one another. Then describes the implement of the whole hardware resources management system and gives the test data. At last the author gives the conclusion of the main results and the further work.
Keywords/Search Tags:intranet security, hardware device control, WDM, filter driver
PDF Full Text Request
Related items