Font Size: a A A

Research And Implementation Based On The Struts Framework Security Policy

Posted on:2009-11-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y SunFull Text:PDF
GTID:2208360245479236Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the computer network and distribution compute technology grows mature, the Struts frame based on MVC model gradually become the main exploitation stream of midium and small size corporation. According to the report of security corporation, network attack now links to economic interests. To midium and small size corporations, upon the cost pressure , lack of technology support, and needs of protection for important informtaion, they need mature and trustful technology to insure the security of their information. I deeply perceived this kind of demands, when I took part in the SANY project. So I take advantage of the graduation design to first evaluate the merits and demerits of the present J2EE plus fire wall network exploitation model in network security. On this condition, I combined the present technology to design a security system applied to Struts frame. The traits of the system are maturity in technology and easy to carry out. And with the great potential of the system, it could be developed by adapting the mode of service combination.The dissertation of the system is genarally in three parts. First is the authentication and warranty system within the Struts frame exploitation. The technology of this part is relatively mature, as it has already applied to the SANY project, which is now good in work. The second part is to design a network protection course with sniff function. With this course, written by C++, we can analyse whether an IP is trustful or not and then take further action. The course also contributes in the communication between different courses respectively written by Java and C++. The last part are ameliorations on the second part. The ameliorations include research on course concealing, memory pool computing and service combination. These research could be applied to security system, applied to Struts frame, with real business value.This paper describes each of the three parts respectively in one section. The realization or test of them are all in the paper. The result shows that the design is feasible, which achieves the anticipated research purpose and expectation.
Keywords/Search Tags:AOP, Access Control, Sniffer, Memory Pool, MD5, JNI, Hide Process, Security
PDF Full Text Request
Related items