Font Size: a A A

The Design And Realization Of Anomaly Traffic Analysis System For Large Private Networks

Posted on:2011-02-26Degree:MasterType:Thesis
Country:ChinaCandidate:F WangFull Text:PDF
GTID:2298330335459914Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the enlargement and complication of network scale, the network behaviors have become more and more complex and difficult to be controlled. Thus, the network access operations compliance will be difficult to assure in the application systems. In addition, the offensive behaviors are not easy to detect and find, such as stealing and destroying the data. The service security also be encountered the serious security threats. To protect the application system operating securely, stably and efficiently, IT management departments need to monitor the traffic bandwidth and network behaviors, grasp the underlying network conditions in various applications and internal operations accurately, and assess the health status for the application system.A security monitoring and anomaly traffic analyzing system is proposed and designed for the large network application system in this article. This system has the industry features, and which is designed to satisfy the practical work need. As a security infrastructure for further extension and expansion, this system can monitor and manage the resources of the information infrastructures which contain the distribution of network bandwidth, traffic distribution and changes, and network access operations compliance. This system can play an important role to ensure the application and service directly.In this article, the standards and present situations are analyzed for the network security products firstly, and the network securities are researched deeply. The system requirements for application security monitoring and anomaly traffic detecting are proposed due to the analysis of the application security, traffic analysis and anomaly monitoring. Subsequently, the detailed description of the application security monitoring and anomaly traffic analyzing system according with the need of practical work is proposed. In the scheme design phase, detailed research and analysis are performed from the design ideas and working principles to the work flow and the module partition, and the system performance is explained summarily. In the incessant improving and testing process, some functional modules are tested and the test results are analyzed. Finally, the further amelioration ideas are proposed for the functional expansion, performance improvement, deployment and other aspects according with the system operating.
Keywords/Search Tags:network security, security monitoring, application security, Anomaly Traffic
PDF Full Text Request
Related items