Font Size: a A A

Design And Implementation Of Risk Assessment System Based On The Data Of The Firewall

Posted on:2014-08-17Degree:MasterType:Thesis
Country:ChinaCandidate:H G ChenFull Text:PDF
GTID:2268330401967190Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The development of the Internet is growing rapidly, the network has enteredvarious fields of social life, and it has brought great convenience to people’s lives, wecan work in home instead of company, Shopping and transfer network filled withpeople’s lives, Taobao,360buy, Suning, Amazon and other shopping sites havemushroomed take out, but how to protect everyone’s interest not to have been infringed,which requires us to be very safe network. However, the network is open, and online allkinds of people, we can not guarantee that everyone abide by the law, which resulted inthe network threats intensified. Therefore, how to use effective and feasible method toNetwork dangerous down to more and more attention within the acceptable range. Sonow appears online network security hardware and software tools, such as firewalls,vulnerability scanning tools, intrusion detection tools and anti-virus software, etc., theface of so many network security tools, how do we choose which needs to evaluatethese tools.The firewall is now mature network security technology, it can block the majorityof network attacks, firewall security is directly related to our vital interests. For firewalltechnology, almost every firewall generates a firewall log to record the views and theresults of the firewall packet processing, then we can design software, a softwarefirewall log files, log different content, and establish the mathematical evaluation model,a comprehensive analysis of these data and get the score results, in firewall security riskassessment based on the ratings results, in order to determine the level of security of thesystem.Through the assessment of the system, we can discover whether the firewallproblem, so we can do a good job of basic security measures to modify the firewallrules in a timely manner, to reduce network threats and security risks.
Keywords/Search Tags:Network security, Firewall, Risk assessment
PDF Full Text Request
Related items