Font Size: a A A

Access To Network Security And Emergency Response System Design And Implementation

Posted on:2008-08-22Degree:MasterType:Thesis
Country:ChinaCandidate:J Z YaoFull Text:PDF
GTID:2208360215985027Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of Intemet, network security involes much more focus. And when more and more companies provide their core service through intranet/LAN, it is a prominent problem how to ensure the security of intranet and terminals. How to access network with security terminal is a hot spot.This dissertation firstly analyzes the research state of the endpoint security technology, and the deficiency of current endpoint management system in usability and adaptability. Then, based on discussing the advantages of endpoint security, this dissertation brings forward a access security system model based on existent network devices and TCP/IP protocols. The model takes advantage of the capability of the devices and the standard protocols. Being differ from other endpoint security systems, it is easy to use and less configuration that no terminal is needed.Then this dissertation designs collectivity and realizes details of model, the emphasis is the means to block user and inform user. Relying on this model, this dissertation realizes NASRS (The abbreviation of Network Access Security and Response System). NASRS mainly includes two sub-modules, namely the block module and response module. By using a block process which is periodically re-executed in background, the user's information is recorded, then NASRS will block user by DNS redirection and routing-based policy. After describing the principle of the block process, this dissertation introduces the proficient techniques and process in detail. In the response module, NASRS perform automail and transfer SMS to the user.In the end, NASRS is deployed and configured in lab. It pass through all performance tests. NASRS make up the deficiency of endpoint security systems in efficiency, and advance the usability and extend capability of endpoint management system.
Keywords/Search Tags:network security, internal net, endpoint, response
PDF Full Text Request
Related items