Font Size: a A A

Research And Development Of Security Monitoring System On Web Server

Posted on:2011-07-19Degree:MasterType:Thesis
Country:ChinaCandidate:C YanFull Text:PDF
GTID:2178360305494741Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Currently, with the advance of Web technology, in order to improve the work efficiency,most schools, government agencies and enterprises have applied a number of online services which lead to a large number of attacks and destructions for Web applications. The traditional Web security focuses on the network layer, so the web application does not attract enough attention. The mainstream hardware firewalls can not effectively deal with attack to the Web applications and provide protection to the Web server. The problem of how to monitor and protect the Web server has become an important research subject.This paper analyzes the web server security problems, and proposes a design of web server security monitoring system. It divides the monitoring system into three aspects. The first one is about getting the real-time status information which includes the Web server's performance and process information. The second one is safety protection which prevents the attack to web application, detect the Distributed Denial of Service and monitor the system's processes. The last one is system vulnerability testing. This system can provide comprehensive protection to the web server.This paper makes an in-depth study of the Linux and Windows process control technology and implements the system process monitoring function by the event trigger mechanism and the kernel driver method. By analyzing the technology of vulnerability detection, it realizes the function of vulnerability detection on different Web servers. According to the system's architecture and the application background it uses I/O multiplexing system communication model. It designs and implements the intelligent recognition of DDoS attacks based on the server's performance.
Keywords/Search Tags:web application attacks, DDoS, process monitoring, vulnerability detection
PDF Full Text Request
Related items