Font Size: a A A

Design And Implement Of Security Audit And Network Monitoring In Network Security

Posted on:2005-07-06Degree:MasterType:Thesis
Country:ChinaCandidate:L ChenFull Text:PDF
GTID:2168360122975337Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
This paper is the research that the state of development of auditting and controls technology safely in the network security is carried on. We can use the technology of audit and monitoring to assess the security of the network and integrality of the sensitive data, find the potential security threat, discern the attack, and count the unusual behavior, report to the manager about the behavior which violates the safe regulation through monitoring the network activities, audit the system configuration and security holes, analyze the network user and system's behavior, and count and analyze the network and system regularly. The network monitoring and audit instance system that recommend in the article is designed according to network monitoring and audit technology.The system has realized monitoring the behavior of the network user through sampling and analyzing network packet. And through the auditing to the daily record of the host computer and daily record of the proxy server.etc, record and alarm the actions which threat the system,this system give the results to the administrator which were concluded from analyzing by direct issue form.This has greatly improved the level of safety management of network.This system has obtain good actual effect.It is a major issue which concern benefit of the country, the collective interests and user's vital interests that the information is safe, It is the technology that can only depend on one's own scientific and technological strength development of our country , must not rely on the outside technology and equipment because of the" potential" safety hazard. According to the understanding and recognizing of auditing and network security environment, we have pointed out the importance of auditing and controls technology of the network in the article. And through design and implement of a instance system,! stated the application and realization of how auditing and control technology of network were used in this system,then I explained and discussed the key technology that is used in this system detailedly.In the first half of this thesis, I introduced the current network safety situation mainly, explained and discussed the network attacking and systematic potential safety hazard, analyzed and compared traditional network safety protection technology, and eventually educed the urgent demand of the network security audit and controlling systematically. In the latter, through design and implement of a instance system, I point out general model of security auditing and control technology of network, then introduced the theory of model design .1 stated the realization of the model and discussed the key technology used in this system, including SNMP used in the network data collecting process, RMON, Oracle OCI used in the saving of auditing data, programming of UCD-SNMP Agent, issuance through Apache Server in Unix.
Keywords/Search Tags:Security Audit, Network Monitoring, Agent, SNMP, RMON, Oracle OCI
PDF Full Text Request
Related items