Font Size: a A A

The Design And Implementation Of The Monitor System For Sensitive Information

Posted on:2011-07-07Degree:MasterType:Thesis
Country:ChinaCandidate:X W CongFull Text:PDF
GTID:2178330332967416Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, the computer network has been extended to all the fields of people's work and life.There is massive information transmitted to the network, which includes important sensitive information such as trade secrets,country's political, economic, military, cultural and diplomatic affairs. If such information is let out, business interests and even national security will be seriously damaged.In China, relevant departments have already made it clear that if there is no security measure, transmitting important information of business secrets, work secrets or national secrets is forbidden, but some units and departments ignore the relevant regulations,but transmit the important sensitive information about business interests and national security using e-mail, instant messaging and other means.Therefore,we must set up an effective information monitoring system to monitor the transmission of important sensitive information as soon as possible and prevent anyone from betraying the important information as well as possible.According to the analysis of some transfer protocol in this paper, we should build a analysis platform which covers most of the current treatment protocol, and it can filter and block sensitive information from being transmitted on the network.This system is a sensitive monitoring system for early warning and defense which consists of two parts, one is data processing and warning centers, the other is front detective nodes located in network exports of important departments. The front detective nodes analyzes the original data on the network, finds out the required data and information, processes them timely through data processing and warning centers.In addition, the system can also analyze the network behavior of the end hosts with the behavioral character, and filter the network behavior of the special Trojan or unknown Trojan to find them, then, the system gives an alarm to the system platform to prevent the occurrence of betraying secrets caused by hostile program.The system uses intelligent processing of massive information, like data mining, classification and filtering, semantic analysis, multimedia information processing and so on to achieve mining and processing of important data deeply.
Keywords/Search Tags:Internet, monitor system, sensitive information, Trojan
PDF Full Text Request
Related items