Font Size: a A A

Design And Realization Of Illegal External Link Monitoring System For Classified Network

Posted on:2017-01-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y DuanFull Text:PDF
GTID:2308330485460754Subject:Computer technology
Abstract/Summary:PDF Full Text Request
A good deal of national classified information are saved in the classified network. Once it leaked out will cause serious damage to the country. So China has established a legal system and some institutions to serve the problem. Like prohibit the classified network from the public information network, the internet and other external network, and use physical isolation in order to reduce security threats from the external network. But the internal network also exists many threats, in which illegal external connection monitoring is the significant protection measure, once destroyed, resulting in a great security risk even the losing and leaking of classified information. So it is necessary to transform and optimize the safety control measures in existing secret-related information system to ensure the information security control well.In this thesis, through giving a research to two current mainstream illegal external connection monitoring technologies, we put forward more scientific illegal external connection monitoring mechanism, completed the design and implementation of the system, and tested and analyzed the system at the main time.The main work done in this thesis are as follow:(1) Gave a deep research and analysis to the dual mode and the client agent model of the two current mainstream illegal external connection monitoring. And combined the advantages of the two modes to design a set of scientific and reliable illegal external link protection scheme.(2) Designed and realized the system according to the protection scheme. The system had optimized the monitoring mechanism, effectively improved the problem of easy to producing false positive and false negative, and safety concerned problems of programming process.(3) Completed the deployment of the system, done some relevant functional testing according to the requirements, and analyzed the test results.The designed illegal external connection monitoring system in this thesis has come into use. In practical use, the operation of the system is stable. And we basically reach the expected design goals in lowering false positive and false negative rate, and ensuring the client process safety.
Keywords/Search Tags:illegal connection, network security, physical isolation, blocking alarm, monitoring terminal
PDF Full Text Request
Related items