Font Size: a A A

Distributed Website Tamper-Proof System Of Three-Tier Filtration

Posted on:2008-05-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y C ZhangFull Text:PDF
GTID:2178360242973278Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Website Tamper-Proof System appeared in the rapid development wave of the Internet, and it was continue developing accompanied with the in-depth security needs of Web Site. However, because of the lag of using technology and the structure, the existence of such systems are certain restrictions or defect. The core technology, the Website Tamper-Proof System mainly uses polling scanning and incident triggered two technologies, the former is inefficient, and the main problem of the latter is the inadequate security. The system architecture, most of the current uses of such systems is independent structure and C / S structure. The two structures are quite inadequate in the ease of operation, managing normative aspects.Therefore, the in-depth study to achieve a more efficient and secure website tamper-resistant technology, to combine with the current advanced B / S service structure, to build a new Website Tamper-Resistant System, and to resolve the existing defects or problems of the current system is particularly important and urgent.Considering the feature that the protecting object of the Tamper-Resistant System is the physical disk document of the web server, we identified the analysis of two aspects of technical improvements: First, the request filtration of the Web / Application server software, and the other is document filter driver. In such a train of thought, based on the in-depth study of the operating mechanism of the Web / Application server software (focused on client request procedures), and followed the Servlet2.4 norms to achieve the Tamper-Resistant Filter Plug-ins. This plug-in can intercept all requests of the http / https and analyses of the implied physical disk document path and, in conjunction with the paper watermark technology determine the legitimacy and thus able to ensure the content validity of the feedbacks to the user's browser. Second, on the basis of the research of document filter driving technology, the plug-in accomplished real-time blocking driver, the driver can prevent the illegal process from changing the documents on the physical disk according to the process information, thereby it greatly reduces the circumstances that the site documents were juggled, to a certain extent, it had reached the effect of preventing tampering with results. Finally, the research and achievement of the Web-based real-time blocking driver and filtering plug-in, combined with the current events trigger technology, proposed a three-tier filtration model, thus achieved tampering with the prevention, trigger detection and content filtering three levels of depth protection, greatly improved the system safety, and completely stamped out the Internet dissemination of the illegal content.Secondly, under the premise of the three-tier filter model, hereon analyses the system's architecture, design, hierarchical structure, the structural components, as well as design process followed in the various standards and methods more deeply. The background of the system uses C / S mode. It is responsible to cope with the internal logical process such as document recover. However, from a user's perspective, the system uses B / S model to maintain and manage, which largely resolved the contradictions of its own security and ease of operability. In addition, in the perspective of the overall structure of the system, this paper briefly describes the hierarchical structure of the system and components structures. The hierarchical structure fully embodies the principle of layered software, and it will bring many advantages for the maintenance and upgrades of the system. Second, the partition of the components materializes the design method of the software component. The introduction of this design method facilitates a new system to expand the functions of components, and reflects the software design thinking that it is changing with needs.Finally, this paper describes in more detail the system changes before and after deployment in real network environment, especially focused on the elaboration of system assisted by automatic synchronization of the system components (events trigger technique application in release stages) and the CMS website publishing system.
Keywords/Search Tags:website tamper-proof, three-tier filtration, website monitor
PDF Full Text Request
Related items