Font Size: a A A

A Designing And Implementation Of Intranet Security Management System Based On Behavior Analysis

Posted on:2009-03-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ZhaoFull Text:PDF
GTID:2178360272479798Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the development of information technology and wide use of Internet in the world, computer network become more and more important to everyone's life and work.At the same time, more challenge in information field appeared.The attacks launched by the inner people or abuse of resources hold a large proportion of all the attacks. Therefore, the security of intranet and hosts is essential to many companies and government departments.In this paper, it mailly reaserch number of key technology about network of security-related technology, and design an eventually achieve a full-featured, network security management and security monitoring system.Firstly, it introduces the the background and significance of inner network security management and security monitoring system, and introduces several popular products, analysis of its strengths and weaknesses, and introduce some network security-related technologies.Second, this article analyses the illegal network behavior detecting technology, which includes illegal intranet-connect detecting and illegal internet-connect detecting. Controlling of illegal internet-connect mainly by the use of LAN protocols analysis and sending packets to detectting the illegal internet-connect and isolating the illegal mainframe. Monitoring of illegal intranet-connect is maily using packet filtering technology to detecting the illegal intranet-connect and blocking the illegal acts.The paper discuss illegal mainframe behavior monitoring technology mailly from the three main areas, which includes the visit of sensitive documents, the use of peripherals and the client-agents's own security. It related to a number of technologys, such as file system monitoring, file decoding, registry and system services monitoring and process hide.etc.Combining the techniques we have discussed, the paper designed and implemented a network security management and security monitoring system within the intranet, describes the framework of the whole system, the design of the modules, as well as the methods of communication between modules. In the actual operation, the system was proved to be practical and promote good values.
Keywords/Search Tags:Inner Network Security, Iillegal internet-connect, Illegal intranet-connect, Mainframe monitoring
PDF Full Text Request
Related items