Font Size: a A A

Research And Implementation Of Network Security Management System Based On Economic Development Zone

Posted on:2013-05-02Degree:MasterType:Thesis
Country:ChinaCandidate:C G WangFull Text:PDF
GTID:2208330473956134Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, computer network in the economy and people’s livelihood is rapidly increasing in various fields, the entire community to the network increasingly dependent on. A large number of enterprises, organizations, government departments and agencies are set up and develop their own network and connect to the Intemet in order to fully share the use of network information and resources. With the development of computer networks, also had a variety of issues, especially security issues: unauthorized access, malicious attacks,computer viruses and other network security threats become more serious.Because of the lack of running real-time monitoring and management of the Economic Development Zone, network, network security devices exist, there is no overall force, it is difficult to achieve interaction and sharing of safety information, which can not make a reasonable assessment of network conditions. In order to address the issue of network security, firewall, intrusion detection systems, such as safety equipment in the network is widely used. Nevertheless, in the face of network attacks, the loss is still heavy. Network security protection requires not only technology and, more importantly, network security management. Lack of the entire network to monitor the security situation in the overall management,network configuration in the safety equipment has become an island of information, and network security managers can not carry out safety information exchange, and thus unable to give full play to their safety performance.This paper introduced at the beginning of network security management technology than in the general-purpose network management technology, features and advantages, and the design of a distributed multi-layer structure of network security management system prototype.In the structural design of the system, adopted a decentralized, distributed storage, unified management, unified audit of the distributed architecture in order to adapt to the needs of network security management. System design is characterized by a cascade structure, can be infinite cascade, which combines the design of the system and distributed load balancing the benefits of technology, with a great deal of flexibility and expansive.The innovations of our work are mainly four aspects as follows:(1)We through the understanding of the security elements of the Riverside Economic Development Zone Network and network security target requirements analysis, development and identify and design network security management, management functions and management platform;(2)Riverside Economic Development Zone network status and security threats,analysis of the reliability of the network application server security issues, secure access to the application of analysis, analysis of virus prevention and management of classified economic information needs of the system demonstration;(3)the completion of the Development Zone, the overall design of the network security and the design of the platform module; from IP address planning, security design of server systems, remote access system design, based VLAN anti-virus system design, system design, and hardware firewall, software firewall, antivirus software, virus database automatically on a regular basis update the software,virtual local area network isolation broadcast storms, security, server monitoring a combination of build-virus protection system;(4)and the design of the development zone of the network system security policy management module, the initialization of the strategy and is automatically added, and present a Router addressing arithmetic based on optimal route with the method of decentralization, at last, analyzing and testing the performance of network with by means of experiment.
Keywords/Search Tags:network management, network security, sysytem design
PDF Full Text Request
Related items