Font Size: a A A

Design And Implementation Of Network Information Audit System

Posted on:2016-07-29Degree:MasterType:Thesis
Country:ChinaCandidate:L LiaoFull Text:PDF
GTID:2348330488455691Subject:Engineering
Abstract/Summary:PDF Full Text Request
Twenty-first century, the internet is booming, it is changing people's lives which bring a lot of convenience to people step by step. In the work, people use the Internet to solve the problems, which improves the efficiency of people's work; In our life, people use the internet for shopping, watch videos,access to information,and so on, it's facilitating our lives.People use the network in the Work and life, it can be said,people's life will become very difficult without network. However, it has also brought some problems when the internet is developing rapidly. Reactionary pornographic content on the Internet spread, corporate disclosure of technical information on trade secrets, employees engaged in work related online entertainment activity in work hours leads to inefficiency, bandwidth is always enough lead unable to carry out normal business. With this problems, network security-related issues began to attract people's attention. This network security issues is happend, the state resulted in significant economic losses. However, there is not an ideal product to solve related problems well in markets.This paper designed and implemented a set of content, behavior and security audit system which is a good solution to these security problems.Network information audit system is designed in reference JUMP information, SANGFO online behavior management system and information audit system of Hua Yu Tang Feng. JUMP information audit system is mainly for information auditing system for a small part of the network behavior and e-mail, file transfer protocol content; SANGFO online behavior management is deeply convinced the company to develop a set of network behavior audit and management system, which features comparison of the behavior of fine-grained auditing; The information audit system of Hua Yu Tang Feng is also design for the audit of network information,The report form diversification is one major characteristic. At first,this paper introduces the background and significance of network Information audit,analyzes the development status of network information audit in our country and abroad, it also describes the content and structure of the paper;Secondly, technical papers related applications were introduced related technologies, it includes URL matching principle, DPDK capture technology and database encryption audit techniques; Once again, it is the system's demand analysis, its main contents include: a statement of system business, system functional requirements and system non-functional requirements analysis, The function modules include capture engine module, content audit module, conduct audit module and safety audit module;once more, on the basis of demand established,it introduces the plan of overall system design, and describes the design and implementation of major function modules, In the last, it is the system integration and testing,and the test results are described in detail.The basic functions of the system are verified on the audit platform. The test results show that it is right for the system to use the plan of packet capture engine and analysis modules.The basic functions of the system to verify correct, the system have good performance and high stability, the development of network information audit is successful. This system to perfect the market for information audit requirements and provides a strong guarantee for information security.
Keywords/Search Tags:Network Information Audit, Capture engine module, Analysis engine module, Strategy match modle, information security
PDF Full Text Request
Related items