Font Size: a A A

Intranet Host Monitor And Access Control System Research

Posted on:2011-04-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q HuFull Text:PDF
GTID:2178330332478548Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Classified units and enterprises has classified private network, in accordance with the confidentiality provisions of the physical isolation with the Internet, and generally are equipped with appropriate security system,At present the main function of this type of security system is the mobile media management, and only certified mobile media can plugin and access, optical disc burner burn ban, allowing only read the disc, Internet records of monitoring; but the secret internal network access is not management and monitoring, there is unauthorized host access internal classified network, and classified host access the Internet. As similar lack of confidentiality and information systems security faces increasingly serious threat to the urgent need for a host monitoring and internal network access control system. This design of the "internal network host monitoring and access control system" to try to resolve these two issues, to make up for deficiencies related to security systems also can improve the viability of secrecy systems, making security systems to effectively and fully play the role. Main tasks are as follows:Built the internal network host access control system and integrated monitoring system framework.Write a client application and-the NDIS intermediate driver to achieve the collection of host information, secure communications, control classified host outreach and other functions, and use technology to enhance the process of hiding the existence of the application. Client users to host real-time monitoring, blocking classified host connected to the Internet.Learning the network access principles and techniques, SNMP protocol, build a server management application, a database server to achieve the host security authorization and logging, access control and records of such violations operation. Server and switch to the blocking of non-authorized hosts to connect classified network, record violations to replacement of hard disk, uninstall security systems, access to the Internet and other illegal behaviors.
Keywords/Search Tags:security, host monitor, access control
PDF Full Text Request
Related items