Font Size: a A A

Network Security Management System Test And Design For Centralized Log Audit Subsystem

Posted on:2009-04-27Degree:MasterType:Thesis
Country:ChinaCandidate:Z Z FanFull Text:PDF
GTID:2178360278466099Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the information technology in-depth developing in our country, we rely on the information systems more and more. The information systems of good-sized enterprise contain legion applications, complex structure, covering a vast, involving volume of departments and personnel, consequently, the information systems is confronted with various security threats. With the rapid development of operations of China Mobile Group Co., Ltd. Qinghai ,the networks continue to be expanded, the new variety of support systems to be constructed, information security issue have become more prominent, network security issue urgently to be resolved .These years, with the rapid development of mobile communications operations, the number of the host computers, network settings and operation systems have been greatly increased, the dimensions of the network have been fleetly extended, at the same time, the number of the consumers is increasing either. However security issues often occur because of the lack of the inside supervise measures. Each operation system possesses of one unattached user information data, besides, the behavior of manipulators on the systems just audited by log separately, this kind of the elementary audit steps can not satisfy the demand of nowadays and future operations development for China Mobile Group Co., Ltd. Qinghai.According to the network status of China Mobile Group Co., Ltd. Qinghai, studying on the centralized and unified platform of the safety technology and management, making the system and security manager to do real-time focus of the audit log for the system users, network events and visitor behavior. By flexible configuration security Audit parameters of early warning and control strategies, we can detect real-time detection of suspicious operations, real-time warnings or even blocking, consequently ensure safety of the network.This article designs the network system 4A business network log audit subsystem on the basis needs and analysis of the business of network security audit log and in the light of network security management system specification, also deploys the part of the Qinghai mobile network operations, the audit log according to the basic framework of the 4A system. Through the system acceptance tests to verify the system to meet the unified user management, unified management and centralized authority and auditing requirements put forward by the China Mobile Group Co., Ltd., except the normal operation of this system, achieves good results for the business network and provides a safe and efficient application environment.
Keywords/Search Tags:security, audit log, design, test
PDF Full Text Request
Related items