Font Size: a A A

Design And Implementation Of Network Attacks And Internet Behavior Query System

Posted on:2015-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:B ZhengFull Text:PDF
GTID:2268330428984154Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Driven by the rapid development of modern computer technology,network equipment and network application market has been boomingdevelopment, at the same time information network has become animportant guarantee of social development. In recent years, with theextension of the network the network has expanded rapidly, securityissues become increasingly complicated. There is a lot of sensitiveinformation on the network, and it will inevitably attract a variety ofman-made attacks (such as theft, data tampering, data additions, computerviruses, etc.). With the current situation that network projects hosted inour country’s network has been increasingly complex, To build amanageable, controllable, credible security network for a variety ofenterprises and institutions is not only a prerequisite to further promotethe development of network applications, but also the importantguarantee for completion of the enterprise information strategicobjectives. Thus, a set of online behavior management and networkauditing as one of the online behavior of network attacks and querysystem has owned more practical significance.After thorough research on the network audit areas, this thesis firstanalyzed the at home and abroad status of the network audit direction,and on the basis of it, key features of online behavior analysis andnetwork attack detection system were identified, and thus a feasibilityanalysis of the system design and implementation was conducted.Secondly, the Snort intrusion detection engine works and architecturewere discussed, basic principles and application forms of Ajax, Struts andHibernate technology were introduced briefly and the meaning of packets intercepted by Snort under Slackware12.0were analyzed and thecontents of the packet written to the MySQL database was correctlyconfigured. The system was implemented based on B/S modelarchitecture, the implemented tools were Snort+Tomcat+MySQL+Eclipse, and the system design was used the MVC architecture. Networkattacks and online behavior query system written sensitive fields into thedatabase by analyzing the packets contents that intercepted by Snort andmonitored network segment of foreground through a database.Network attacks and Internet behavior query system implementeduser registration, login, content query and intrusion detection and otherbasic functions. The system is highly flexible and scalable to meet theneeds of network scale and manage business growth, and owns goodusability and interoperability with other systems.
Keywords/Search Tags:Network attacks, intrusion detection, Snort, Struts framework, Hibernate
PDF Full Text Request
Related items