Font Size: a A A

Design And Implementation Of Anshan Power Network Audit System

Posted on:2017-07-24Degree:MasterType:Thesis
Country:ChinaCandidate:Z W JiangFull Text:PDF
GTID:2348330488458885Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of information technology, more and more business and government departments have gained an access to the Internet. This greatly enhances their ability of collecting and using external information expands the range of communication, while reducing the acquisition costs of information resources and improving the efficiency. However, due to the complexity and diversity of the Internet, a lack of supervision on using network will bring the company plenty of troubles. These problems are represented by employees'abuse of network resources, the disclosure of confidential information and so on. In order to solve all these problems, an effective method is desperately needed to monitor and audit actions on the network.The implementation of the network audit system is investigated. After studying and researching some successful examples of network audit systems, the Linux operating system is selected as the development platform and Libnids as the kernel library. By capturing network packets and analyzing their content, researchers can identify different user behaviors on the Internet by analyzing such information. After obtaining enough information for a certain period of time, the common network behavior of network users can be acquired through analyzing these data, thus achieving the goal of audit.A viable network audit system is presented here. It's able to achieve the basic functions to monitor networks. The network behavior of each IP address is recorded in the database, and the statistical reports is available through the user interface, which makes it easy for the managers to master the network behavior of employees in working time. The overall network behaviors of network users can be known through analyzing these data. Combined these data with the company's internal management, the waste of network resources in the working time can be efficiently and greatly reduced.
Keywords/Search Tags:Network Monitoring, Network Data, Libnids, Data Analysis, Network Behavior
PDF Full Text Request
Related items