Font Size: a A A

The Research And Implementation Of A Network Security Audit System

Posted on:2010-07-08Degree:MasterType:Thesis
Country:ChinaCandidate:Z D YaoFull Text:PDF
GTID:2178360278466398Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the fast development of network and the evolution of information technology, various information systems have penetrated into all areas of society extensively. The systems have been gradually extending from traditional, single, small-scale business systems to large-scale, sundry, networked business systems, which makes the systems on network predominate. While we are extensively using network resources, the attacks to the network and computer are emerging in an endless stream and increasingly complex, which has brought a wide range of security issues. However the popular network firewall, intrusion detection system and encryption application technologies commonly emphasized on the prevention of outside intrusion and the behavior from insiders is less considered, so network security accidents such as the unauthorized disclosure of secret occurred frequently. The network security audit system can effectively discover and prevent inner anomalous behaviors by recording and detecting the behaviors of accessing the network and its business. Researching and developing network security audit product is significant.In this paper, researches are made on the technology related to the network security audit and a design and implementation of a network security audit system is given out. The main content is as follows:(1) The research background, meaning of the network security audit system are introduced. Starting from the concept of security audit, a basic overview of security audit is summarized and the existing state of network security audit system is described.(2) The requirement and system architecture design are introduced. According to the structure requirement, the system is composed of agent, management center, and database center.(3) Under the research of technology in data collection, analysis, detection and etc., the corresponding solutions are given according to the practical needs of system.Finally the paper summarizes the full text, and then analyzes the existed problems in current system and how to improve the system next step.
Keywords/Search Tags:network security audit, data collection, protocol analysis, pattern matching, association analysis
PDF Full Text Request
Related items