Font Size: a A A

Research And Implement Of Campus Network Security Monitoring And Security Audit

Posted on:2008-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:G L DingFull Text:PDF
GTID:2178360215461692Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
It's well-known that network security is an important guarantee of the development of this society which is filled with a great deal of information. It's almost inevitable that many students misappropriate network resources. Login illegal websites due to curiosity, which result in the dissemination of waste e-mails and network virus. Some of them even attack computers of important departments of campus network systems. Therefore, network security is confronted with a great challenge. The system of campus network security monitoring and security audit in this paper is designed and planned to be carried out to meet current technological requirement. This system is able to monitor network users through sampling and analyzing network data, to record the harmful behavior to network security and give timely alarm through auditing logs of host computers, proxy servers and e-mail servers etc, and to present the analyzed results and statistic data to the administrators in the direct and convenient form of network information release, which improve network security protection to a considerably high degree.Combining both technology of security monitoring and auditing. This paper aims at making a research on how to protect security of campus network and has put this new technology into practice tentatively. In the first half of the paper, I mainly describe the safety environment of current network, analyze and compare all the traditional protective technology of maintaining network security, and make a further research on the potential danger underlying the network, the current ways of protecting network security. Therefore, comes a conclusion that the security monitoring and auditing to the networks and networks system is in great need without any doubt. In the latter part of the paper, I put forward common model structures of network monitoring and security audit, introduce the design principles and describe its application in reality through the process of designing and running a concrete system. Moreover, the application of some key technology used for collecting networks data, SQL Server for saving audit data, UCD-SNMP for writing Proxy Program and step-by-step audit technology for filtrating the e-mail server based on its content under windows environment.This paper focuses on designing and applying technology of preventing the misappropriation of IP addresses, technology of auditing networks equipment's property, proxy servers and e-mail servers.The comprehensive administrative network system based on the technology of networks monitoring and security audit has been carried out on the campus network system of Shenyang Equipment Manufacturing Engineering School, and has reached relatively good results.
Keywords/Search Tags:Security Audit, Network Monitoring, SNMP, RMON, SQL Server
PDF Full Text Request
Related items