Font Size: a A A

Research And Realization Of Intrusion Detection Configuration And Log Audit Service System Based On J2EE

Posted on:2009-12-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y XiaoFull Text:PDF
GTID:2178360242498959Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of network information communication,there are more and more attacks threatening the security of network.It is hence vital for the security of information network.Based on the principle that trying to improve the connectivity of networks after making sure of its security,the Network Security Isolation Control Equipment which we are developing offers a kind of protection of high level security,by forbidding the access of unauthorized users and intrusion detection.In this paper,Intrusion Detection Configration and Log Audit Service System is researched and implemented based on J2EE/javaEE platform.A standard multi-layer-distributed J2EE/javaEE architecture is proposed after deeply research of the J2EE/javaEE architecture and the J2EE/javaEE technologies which are populating. The Struts framework which implements MVC pattern is the presentation tier.The simple JavaBean is the business logic tier.The DAO pattern and Hibernate framework is the persistence tier.Some essential technologies are introduced and their solutions are provided, including data persistence technology,the operation of report forms and statistics diagram,identity authentication based on USB-KEY,the constitution of compound web pages based on STRUTS Tiles framework.The architecture of the system which is realized finally is simple,the structure is legible and the efficiency is high.It is very congruous to be used by such units as government army and enterprises,because of the characteristics of good portability, extendibility,maintainability,easy-to-use,security.
Keywords/Search Tags:Network Security Isolation, Intrusion Detection Configration, log audit, J2EE/javaEE, Struts, Hibernate
PDF Full Text Request
Related items