Font Size: a A A

Network Security Auditing System To Montor Online Behavior

Posted on:2011-08-10Degree:MasterType:Thesis
Country:ChinaCandidate:Y H ShaoFull Text:PDF
GTID:2178360305450059Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of the computer network, it has played an irreplaceable role in a large number of areas. The scale of the network is enlarging gradually, the security problems become even more apparent and the pressure on the management of the network environment also grows. While facing all these, what we adopt are some of the protecting measures, such as fireworks, anti-virus, bug scanning, security auditing IDS and etc. All these are based on the examining the exterior environment to make sure the interior one secure and they can all be regarded as the passive protection., however in reality, those network operator are confronted with security threaten from the interior part of the net, for example, how to improve the working efficiency of the staff, or how to forbid the staff from logging into those websites irrelevant to their work. Due to the restriction in technology, most of the security protecting infrastructure cannot meet the requirements of these.It is estimated that 37% of the network surfing is unrelated to the staffs'work. Surfing the Internet, speculating in the stock market, playing online games, all these greatly undermine their working efficiency. For a enterprise with around 1000 staff, it will have the waste of the resources at about 3 million because of the improper management of the network. In addition, with the wide application of the download softwares like P2P, they take a large share of the bandwith and greatly influence the normal working. Therefore, the reasonable use of the network becomes a rigorous problem. To bring about the good efficiency and keep the work operate smoothly, each enterprise wishes to master the clues for those improper use, having the regularized management on the network.According to all the analysis above, we should take some measures to analyze the behavior of the net users, including time use, websites, and data about the surfing. All of these are the auditing technology on the users'behavior. The exploration and utilization of this technology will benefit enterprises, making them realize their management on the network use, having a deeper understanding about the network using behavior of the staff, regulating the use of the network in the enterprise and even avoiding the assault from the outsiders.
Keywords/Search Tags:network security, security monitoring, online behavior
PDF Full Text Request
Related items