Font Size: a A A

The Design And Implementation Of File Monitor System Based On Security

Posted on:2005-06-06Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2168360125950939Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Due to the web site's special characteristic (open for user's access), it must expose to the Internet, and as a result becomes the attack target of the hackers. On some occasions, the hackers and wicked persons sophisticate the web pages of a web site, and such kind of activity affects the public dramatically. Therefore, as far as the well-known web sites are concerned, especially the authoritative government and medium web sites, they need special web page anti-sophisticate system to guarantee the security of a web page and the content of a web site.Electronic document's security plays an important role in the development of the automatic office work., in respect that the large amount of electronic documents, maintenance becomes a very difficult task, therefore, it needs a facility to maintenance these electronic documents.For the foregoing requirements, we developed a distributed document administration system that based on security. This system provided the functions of anti-sophisticate for web pages and protection for electronic documents. This system, in one way, can backup, monitor and recover the web page automatically, in the other way, it can backup, monitor electronic document for the sake of its security.Base on the above presentation about the system we can conclude that this system mainly serves for release the electronic document for web sites and governments. It can apply on the follow circumstances: government's web site, large corporations and enterprises' web site, web site and host that attract the hackers, enterprises that need to save important documents.The similar products at present are WEBKEEPER, GRSNGGUARD, WEBGUARD etc. Compared with these products, the system has the following advantages: First of all, for most similar products can't solve the problem of efficiency, they were not actually monitoring the documents. Next, this system can be applied on several Operating Systems. Last but not the least, the other similar products haven't considered about the security of themselves and communication.It is the application of the PKI technology which really materialized the security of this product:l)Introduce the certificate to identify the program. In order to ensure each system use the certificate of their own, we developed a certificates issuing system. Thus this solution can help the system to make sure that the user's real identity when communicate.2)Utilize public key technology to transfer the temporary key. As the encrypt rate is quite slow, we introduce symmetrically encrypt technology in encrypt communication. The symmetrically key is a temporary one which created randomly, and was transferred to the other side using the public encrypt technology when his/her identity was identified, after that, he/she will obtain the original information we create.3)Adapt the digital signature technology to ensure the security and integrity of data. When we transfer data, we will transfer a digital signature also, which can ensure the security and integrity of data,This system can be divided into two parts on configuration base (block and layer), they are: Monitor and Keeper. Each subordinate system has two layers, the lower one is the communication layer, which mainly refers to security transmission, such as create connection, encrypt and decrypt, verify information integrity etc. This layer was built in the TCP layer directly. The upper layer is processing layer, which include the configuration of parameters and monitor policy, chose algorithm, web site backup, abstract digest and digital signature, web site monitor and automatically recover etc.The server's main program is Keeper, which refers to configuration, manage system's security and scan policy, backup web site's data and transfer process and so on.Web server's Monitor mainly receives and executes the command from Keeper, and monitor the releasing directory. So far as web server's operating system's variety is concerned, web server's monitor program is independent of operating system and has no interface.Keeper c...
Keywords/Search Tags:Implementation
PDF Full Text Request
Related items