Font Size: a A A

The Design And Implementation Of The Network Monitoring System In State Grid Corporation

Posted on:2017-10-02Degree:MasterType:Thesis
Country:ChinaCandidate:H GuoFull Text:PDF
GTID:2348330503492634Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of national economy and social informatization in China, the operation of economic society has increasingly depended on the sector of public services. The service of power grid in particular has become the key national infrastructure with its overall importance and strategic status being increasingly prominent. At the same time, the openness of public internet, however, causes serious problems of internet and information security. An increasing number of virus and hacker attack as well as the security events caused by humans' mistakes and accidents may lead to the breaking off or even the collapse of external services, bringing irreparable loss to the stable development of the whole society. Internet information security, therefore, has become one of the key problems to the stable development of State Grid Corporation of China.The research and development of network monitoring system will play a major role in the information security management of State Grid Corporation, because the system is able to be aware of the security of the external information network including border attacks, sensitive information, Web attacks, network flow, virus and desktop terminals, and it is able to monitor the safety index of external information networks of the corporate headquarter, branches, corporations at the provincial level and units under the direct supervision of the corporation on a 7x24-hour basis. The network monitoring system of State Grid Corporation of China adopts Service-Oriented Architecture(SOA), and mainly creates the modules of network attack monitoring and monitoring of internet exportation. The design and implementation of the system mainly solves the difficulties including collecting and standard processing of all the logs of monitoring modules, concentrated analysis and revelation of security alarm, and implantation of interfaces among all monitoring modules. After the test of overall functions and performance, the system comes online successfully. Its operation won high appraisal from the leaders and the corporation in use because the system maintains a sound operation and satisfies the requirements of advancement, stability and security, achieving the expected the effect.
Keywords/Search Tags:Information Safety, Network Monitoring System, Alert Analysis
PDF Full Text Request
Related items