Font Size: a A A

Research And Realization Of Illegal Extra-Connection Detecting System

Posted on:2006-06-03Degree:MasterType:Thesis
Country:ChinaCandidate:G H SuiFull Text:PDF
GTID:2168360155952939Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of computer science and related technology, the way that we work and live have changed a lot. Conveniences that we never thought about come to us in a second. Security of network has become a big problem when internet gives us an easy and efficient way to deal with the boss and family. Some large scale corporation had lost their information about the market, someone's password for bankbook has been stolen and the money was taken off. Some government department are visited by hacker sometimes, even CIA can't avoid this. Internet is so good, but the security of network makes us worried. In order to protect the working place and provide a safe room so that man can work easily, some government department and large corporation founded private network, which separate from the internet. Such action is very common in some special industry. Almost every army of the world has at least on private network. With the development of computer science, manufacture about network are becoming cheaper and cheaper, and many governments of our country can build their own private network. Though the private network has separated from the internet, it is not safe enough. Some wrong actions taken by the workers burrow a hole of the private network, so some important file are lost, the government department and corporation are hurt. These harum-scarum workers usually use a modem to connect with the internet, so they can send a mail, view the webpage and talk with others. At the same time, someone with all kinds of purpose can break into the private network and something they want to do. So the connection from the private network to the internet is very dangerous and hackers may barge in the interior working environment and get anything they want, so we must think out a way to prevent this action. To avoid being hacked, we need a method to find if there is a computer in the private network connecting with the internet, and report this message to the one who is in charge of the security of private network. So Illegal Extra-Connection Detecting System comes into service. Illegal Extra-Connection Detecting System is a tool mainly for the security of interior network, it has other functions. Some government department and corporation want to know what have been done to some fields and computers (delete secret files, alter the content of a file). So they need a record about what a operation had happened and who did that. We take this as a part of the Illegal Extra-Connection Detecting System To know what the employees have worked on the shared files of interior network (delete filed, copy files), we must analyze the CIFS/SMB protocol which is widely used for sharing files between computers in the network.
Keywords/Search Tags:Extra-Connection
PDF Full Text Request
Related items