Font Size: a A A

Design Of The Network Security Safeguard System Based On Agent

Posted on:2007-01-21Degree:MasterType:Thesis
Country:ChinaCandidate:X CaiFull Text:PDF
GTID:2178360242461424Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of network technology and the popularization of the Internet, the issue of network security has been paid more attention. The technology of network attack grows fast together with the development of network technology. Network firewalls, intrusion detection systems and antivirus tools have been deployed to deal with so many threatens on network. But with more and more security technologies deployed, many problems appear and these security technologies should be managed with sole platform when the scale of enterprise networks becomes larger and larger. The network security safeguard system based on agent is designed to cope with such tough network security problems.The network security safeguard system is based on TCP/IP protocol and is composed of three child systems as security server (SS), security agent (SA) and security enforcement (SE). SS is responsible to manage the whole network, to set up security policies and to search the attacks based on logs uploaded by SA. SA must carry out the security policies set up by SS and manage the dynamic security modules. SA can be deployed on a host or a subnet. SE can make compulsory authentication on SA by checking some security parameters, and it will allow SA to access network or not based on the checking results and security of the SA host.To accomplish its jobs, the network security safeguard system implements many key technologies, such as how to set up, distribute and parse the security policies, how to manage the dynamic security modules and how to check SA compulsively. Especially, the technology of management of Dynamic modules is developed from the technology of centralized management. This technology makes it easy and fast to deploy or remove a security technology. In addition, it has very good performance.
Keywords/Search Tags:Network Security, Security Model, Security Agent, Security Enforcement, Management of Dynamic Modules
PDF Full Text Request
Related items