Font Size: a A A

Lan Monitoring System Design And Implementation Of Safety Behavior

Posted on:2013-10-02Degree:MasterType:Thesis
Country:ChinaCandidate:L F WuFull Text:PDF
GTID:2248330374986703Subject:Information security
Abstract/Summary:PDF Full Text Request
With the rapid construction of information technology in the enterprises, the LANhas become an important part in the enterprises and institutions nowadays. However,LAN provides convenience to the user, a variety of security and management issues hasfollowed at the same time. Therefore, the real-time monitoring to several of safebehavior on the LAN is in need, which can regulate and adjust the network conduct ofthe host, and can effectively protect the LAN healthy, safety and reliable operation.To LAN security and management issues, the LAN security behavior monitoringsystem has designed and realized in the thesis. The main content of the study as thefollowing:1. Web access filtering: the web content filtering technology based on the vectorspace model, extracting the characteristics feature which play an important role in thedocument classification by information gain method, and structuring the bad feature set.The test page and the term sets are all in vector form to calculate the similarity betweenthem for compared the threshold, in order to filter out bad web page information.2. Spam: the thesis research the spam filtering algorithm based on Bayesian. Themails are collected which are used for constructing the normal set and the spam set offeature library. The features of new mail are extracted to calculate the probabilitythrough the Bayesian.3. Anomaly detection: the thesis research the anomaly detection method based onflow values. Statistics on the traffic situation of the charged host is used for limiting thetraffic speed which the total flow is greater than the preset threshold.4. Software usage restrictions: the software use restriction which based on portmatching technology. The port number which is used for software communicating isextracted to match the default port limit table in order to restrict its use.Finally, the behavior of LAN security monitoring system prototype was tested andsummarized. The test results show that the system has achieved the desired objectives;the advantages and shortcomings of the system are summarized at the same time, thenthis thesis put forward to the further study ideas and methods to the surveillance system of safe behavior.
Keywords/Search Tags:behavior monitoring, web filtering, vector space, spam, bayesian
PDF Full Text Request
Related items