Font Size: a A A

Research Of Malicious Code Incident Information Release Platform

Posted on:2011-12-13Degree:MasterType:Thesis
Country:ChinaCandidate:S K SuFull Text:PDF
GTID:2178330338981943Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years, with the computer network of information technology boom, the Internet into millions of households already widely used in government, business, finance, education, health and other areas of society. And for these important information systems hacking, malicious code into the frequent sabotage has become an important information security threats the most important factor. Information security concerns of many domestic and international IT industry, manufacturers have introduced their own information security and related advisory services. However, the status for the Internet, the information security of the IT industry, the services provided by vendors, mostly using its products for their own products, services or users. Lack of national information security department, focusing on information systems and early warning network of specialized services, the majority of ordinary computer users also need a public safety incident of malicious code publishing platform.The main work of this malicious code security events around the information release platform for the analysis, design, implementation, detailed work. The publishing platform aims to provide a more complete and secure information security incidents malicious code release platform solution. Have the summary, released from different sources and different forms of malicious code security events, providing statistics of malicious programs and malicious site area statistics, to be linked to statistics of Malaysia website, readily available weekly and daily functions.The system has been developed using the key technologies include: ASP-Active Server Script, Ajax technology, AmCharts dynamic Flash charts technology, Sqlserver stored procedures, task scheduling techniques, active honeypot technology, and Delphi function call technology.In the analysis phase, we describe the system requirements, and further demonstrated using UML tools and instructions.In the system design phase, the system establishes the operation of the system design platform, the basic frame structure and design ideas, as well as the relationship between the modules.Finally, the system development work is summarized and perspective of the system, the direction of future development and improvement. Currently, the system has been in the National Computer Virus Emergency Response Center has been initially applied.
Keywords/Search Tags:Malicious code, Malicious Web site, Active honeypot, Situation Release
PDF Full Text Request
Related items