Font Size: a A A

Design And Implementation Of Print And Burn Monitoring And Auditing System

Posted on:2016-05-22Degree:MasterType:Thesis
Country:ChinaCandidate:X B WangFull Text:PDF
GTID:2308330482951593Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of network and information technology, domestic and international organizations are all in information construction. People are using computers, the Internet and other technologies in collaborative office, information release, improvement of production efficiency, at the same time, we are facing a growing problem of information security. Researches show that there are more than 85% of security threats from internal organizations, and as main computer peripherals, printers and recorders have become one of the important ways for internal information leaking. Therefore, it is imperative to adopt effective measures to monitor and audit the contents out of printing and recording.The primary works in this thesis are presented as follows:(1) By taking a full consideration of versatility, efficiency and maintainability, the system architecture with the combination of B/S and C/S is constructed, the hierarchical model of internal system and external interface standards are defined;(2)Based on framework of extensible asynchronous socket, the background services of print control center is achieved for efficient response to clients’operation requests; by using thread pool, buffer and other technologies to optimize the socket communication modules, the servers’ load capacity and processing efficiency are enhanced;(3) The filter drivers of virtual printers and upper disk volume are achieved, which intercept the print task and prohibit burning CD from the kernel layer, and complete the data interaction of kernel layer and application layer of Windows;(4)The detailed design is conducted to client of printing and burning, implementing the application, examination and approval, recycling of printing and burning; the extensible access module of external equipment is defined to access device types of card readers for different users under the premise of modifying codes in small range as far as possible to meet the need of swipe card printing.(5) Self-protection of the main process and key information of the system are implemented:based on Windows’ kernel layer API hook, self-protection processing is started when the main process illegally ends or terminates unexpectedly in order to minimize the risk of system for the external attack or being viciously analyzed.The leak caused by document printing and burning output often involves the core information within the organization with great devastating. The solution in this thesis which can accomplish the whole-process and closed loop management to authentication, examination and approval, tracking and recovery of the file print and burning output, has been put into use currently in domestic several enterprises and organizations. From the point of running effect, it has achieved real-name authentication, digital examination and approval, proof-tampering of contents, statistical analysis of output behavior and cost reducing of consumables of file output, achieving the expected design goal.
Keywords/Search Tags:monitor and audit, print and burn, information leak, virtual printing, filter driver
PDF Full Text Request
Related items