Font Size: a A A

Design & Implementation Of Data Platform Networks Audit System

Posted on:2009-03-29Degree:MasterType:Thesis
Country:ChinaCandidate:M F HuFull Text:PDF
GTID:2178360272473725Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
At present, the IP network has spread to all corners of the world and has been fully integrated into human environment.Our work, study and life depend on it increasingly, the LAN(local area network) has also been set up by the enterprises, companies and schools. Though networks have facilitated the lives and improve the quality of people's life , huge losses have rise by illegal access, viruses, spam and network congestion.Particularly, illegal access, unauthorized operation, allowing potential risks in the network and make the business interests facing unprecedented risks. After the United States passed the Sarbanes-Oxley Act (SOX Act) , detailed regulations and requirements had been put forward to dealing with the internal security problems that existed in all listed companies. Our project will be designed to solve the above problems.Data Services Platform Network Security Auditing System(DSPNSAS) rises audit services in strategic rank and takes the illegal access and unauthorized operation into account, it is a comparatively novel subject. To the SOX, it will be more a mean to the urgent needs of enterprises. In addition to the traditional passive defense style, the Security Audit System can also configure strategyand actively find and positioning multiple illegal access,unauthorized operation with user,blocking them prior to the completion of potential attacking While offering warnings and logging information, the system can offer its own logging analysis and presentation. Data services platform network security audit and leak scanning are in the scope of active defense, but the latter emphasizes on leak scanning while the other one pays attention to services/operations audit. The DSPNSAS refers to the features of the leak scanning system and the characteristics of leak storeroom storage structure to find leaks, as well as the gradually mature such as multithreading network technology, port scanning technology and network sniffer technology. In the part of function module and structural design, we referred the security audit system design and adopted the popular convenient Web C / S interface as user interface.Object oriented design techniques are used to implement the DSPNSAS. In this paper, we first analyze the user needs and propose the system model, then design the overall framework of the system and realize the major function modules. In the course of the analysis of the system design, some key technology and methods have been demonstrated. Though a new perspective to solve the internal network security and network flow problems, mainly embodied in the concept of innovation and audit methodology innovations. In the audit concept innovation, it mainly emphasizes on the illegal internal network operations of the auditorand the management of operators bring about a high efficiency and effectiveness.But the traditional audit determine and address the security issues by finding anomalies in the system services (port, protocols, etc.). In the audit methodology, the main characteristics of this system is that the illegal operation for the internal network is considerd as a auditing standard, including some of the most common characteristics of operation commands.But the traditional auditing method was completed by virus, vulnerability and intrusion behavior characteristics.After finishing the construction of the system, we tested it's function and performance. The results show that the DSPNSAS can basically meet user's needs.It can effectively monitor maintenance operations of the equipments, find and locate the unauthorized operations and illegal invasions, reduce the potential security risks and ensure the production safety and efficiency of the enterprises.
Keywords/Search Tags:unauthorized operation, security risks, security auditing, blocking
PDF Full Text Request
Related items