Font Size: a A A

Design And Implementation Of Website Security Monitoring System

Posted on:2016-06-22Degree:MasterType:Thesis
Country:ChinaCandidate:C ZhangFull Text:PDF
GTID:2308330503476424Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology, internet has been greatly changing everyone’s lifestyle. Indeed, more and more people start fully enjoy getting the enormous shared information from the internet and benefit a lot in every aspect by internet. However, because of the openness of the internet itself, the problem of network security is becoming increasingly vital.All the websites are almost faced with denial of service attacks, Trojans injection, cross site scripting malicious attack etc which lead to service interruptions, site tampering, and personal information leakage all the time. As a result, it becomes a big challenge to keep websites stable and safty these days. Furthermore, the web Trojan has become the most typical attack and caused quite a lot serious security problem since it can be easily made, efficiently spread, variant forms and so on. Therefore, there is no doubt that network security has come to the most critical moment.Base on the above network security situation and the demand for the websites security, this thesis has designed and completed the website security monitoring system which contains two subsystem, the real-time web security monitoring system and the web trojan detection system. First, the web crawler crawls all the web pages and parse to DOM tree before the subsystem response. Secondly, the real-time web security monitoring system, including detecting whether the site is funcationalbe, if a web page with text or pictures are tampered with, whether the site contains dead links, broken links and other issues affecting network efficiency, keeps the websites run smoothly. Thirdly, in order to effectively dectect web trojan, the web trojan dectection system has been designed on the current mainstream web trojan detection technology by using KMP algorithm to compare the different between the page sourse code and the trojan feature library.After all the function modules in this system were completed and tested, the result shows this system can be used to detect potential network security issues due to its reliability, maintainability and expansibility.
Keywords/Search Tags:web crawler, DOM, web trojan, trojan feature library, KMP
PDF Full Text Request
Related items