Font Size: a A A

The Design And Implementation Of A Intranet Monitoring System

Posted on:2010-08-31Degree:MasterType:Thesis
Country:ChinaCandidate:J H HuangFull Text:PDF
GTID:2178360278450985Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, a mass of free resources and network services has much promoted employee's efficiency and bring the high convenience to us, at the same time, many security problems, such as supervising the resources and services and their usage have increasingly attracted people's attention, thanks to the Intranet Monitor system, its appearance has freed these concerns.How to supervise employee efficiently and do not affect their daily work is the key point of such system. Abstract user's behavior, we find that each time he visits a resource or services means one interactive access progress, apparently, these systems have a casual link to the Access Control technology, which, as a mater of fact, builds the Intranet Monitor System referred in this dissertation. According to those traditional models, we conclude a new combination mechanism which suited to Intranet and its achievement shows the access control's future.Unlike other situation, Access Control in Intranet is very difficult to implement, because many employees use Windows Operation System. In order to guarantee the stability, Microsoft introduce the Kernel and User mode, and divide the system into three sub-system such as OS/2, POSIX, Win32 at the first design, finally, the system becomes robust while the extensions are weakened. However, this separation slows Access Control Model's growth, not because of its outdated mode, just for the bound of the Windows 'protection mechanisms. How to control and change Windows default operations following the access strategy is very difficult, a simple action may need many research activities and consume a lot of time. Through the detailed introduction to the realization of the controlled-end subsystem which is a part of the Intranet Monitor System, this dissertation will represent how to implement control measures in Intranet and meet requirements.Compared with other systems, our system protects the resource and services' security in a great extent, including using driver to hide process and control some interfaces, using API hook technology to protect document and so on. It is hoped to present a particular cognition and understanding of the technology used in Intranet Monitor System.
Keywords/Search Tags:intranet, information security, access control, hook, process hidden
PDF Full Text Request
Related items