Font Size: a A A

Internal Network Monitoring Subsystem

Posted on:2008-10-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2208360212475491Subject:Information security
Abstract/Summary:PDF Full Text Request
As an information system based on TCP/IP and HTTP network communicationprotocol, Intranet has become the main form of enterprises' LAN. A mass of freeresources and network services has much promoted employee's efficiency and bring thehigh convenience to us, at the same time, many security problems, such as supervisingthe resources and services and their usage have increasingly attracted people's attention,thanks to the Intranet Monitor system,its appearance has freed these concerns.Hove to supervise employee efficiently and do not affect their daily work is the keypoint of such system.Abstract user's behavior, we find that each time he visits aresource or is serviced means one interactive access progress, apparently, these systemhas a casual link to the Access Control technology, which, as a matter of fact, builds theIntranet Monitor System referred in this dissertation. According to those traditionalmodels, we conclude a new combination mechanism which suited to Intranet and itsachievement shows the access control's future.Unlike other situation, Access Control in Intranet is very difficult to implement,because many employees use different Windows Operation System. In order toguarantee the stability, Microsoft introduce the Kernel and User mode, and devide thesystem into three sub-system such as OS/2, POSIX, Win32 at the first design, finally,the system becomes robust while the extensions are weakened.However, this seperationslows Access Control Model's growth, not because of its outdated mode, just for thebound of the Windows' protection mechanisms. How to control and change Windowsdefault operations following the access strategy is very difficult, a simple action mayneed many research activities and consume a lot of time. Through the datailedintroduction to the realization of the controlled-end subsystem which is a part of theIntranet Monitor System, this dissertation will represent how to implement controlmeasures in Intranet and meet requirements.Compared with other systems, our system protects the resource andservices'security in a great extent, including using driver to hide process and controlsome interfaces, using API hook technology to protect document and so on. It is hoped to present a particular cognition and understanding of the technology used in IntranetMonitor System.
Keywords/Search Tags:Intranet Monitor, Access Control, Driver, API Hook
PDF Full Text Request
Related items