Font Size: a A A

Design And Implementation Of A User Behavior Monitoring Method Based On Web Applications

Posted on:2011-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:N CengFull Text:PDF
GTID:2178360308477207Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technologies, governments and enterprises rely increasingly on web-based applications for help. In order to build a safe and harmonious network environment, security technologies for web-based applications are very important. According to the investigation of FBI/SCI, more than 80% of the most serious damages, especially significant financial losses, are caused by internal network security problems. Therefore, the research of how to detect, prevent and mitigate the inside attacks is significant.Traditional perimeter-based security solutions such as Firewall and Intrusion Detection System (IDS) can efficiently detect outside attacks, but they are unable to solve internal network security problems, especially for information leakage and unauthorized access to important resources. To address this issue, a user behavior monitoring method based on web applications is proposed and a web user behavior monitoring system is designed and implemented based on the proposed method in this thesis. Designed on the Client/Server(C/S) mode and implemented by integrating the URL-based filtering technique with BHO-based monitoring technique, the system can not only filter out adverse unhealthy websites, but can also monitor client users'online behaviors and thus can help managers build harmonious network environment.Multi-thread technology is used to improve the system performance and security strategies such as DES algorithm, automatic running and process protection technique are employed to enhance the system security. Experiments show that the system effectively filters out inappropriate websites, provides vivid analysis of client users'online records in an embedded browser, thus helps managers detect and prevent inside attacks in time. The system implemented in this thesis is useful and with significance of popularization.
Keywords/Search Tags:Insider Network Security, URL-based Filtering, Internet Behavior Monitoring, Browser Help Objects, Thread Pool
PDF Full Text Request
Related items