Font Size: a A A

Research And Implementation Of Monitor Techniques Of Network Users' Behaviors On Intranet

Posted on:2007-06-26Degree:MasterType:Thesis
Country:ChinaCandidate:F XiongFull Text:PDF
GTID:2178360185994513Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Along with the rapid development of Internet, our life, work and study are much tighter with Internet than before. It has become the most important transmission medium of resource share and information intercommunication. It has become the pervasive Internet of people in different industries of our country from the one of the single industry. It has gotten extensive applications in so many fields, and the functions are stronger and stronger in every day while the complexity increasing. On the one hand, it brings convenience to users, on the other hand, it makes it difficult to maintain and prove the network security. And the problems of the network security are more and more prominent.A large number of researches have been done to find out how to maintain the network security effectively and security systems such as Firewall, Intrusion Detection System have been developed, the security protection architecture of intranet and Internet based on the Firewall and IDS has been set up to make the Intranet prevent from attack of exterior network, however, the setting up of this security protection architecture is based on the fact that the Intranet is secure and reliable. And in the network security cases which have happened, more than 70 percent attacks are from the Intranet. So the potential security hazards of Intranet are...
Keywords/Search Tags:Intranet, Users' behavior, Network security, Bypass access, WinPcap, Real-time monitor
PDF Full Text Request
Related items