Font Size: a A A

Research And Implementation Of Security Auditing Platform Based On Public Security System Log

Posted on:2017-03-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhaoFull Text:PDF
GTID:2348330512957346Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of the Internet and the popularization of information technology,network and information technology has been gradually into the People's Daily life and work of social informatization and break through the application of information network the obstacle of the information in time and space,make the value of information,and make the application of information systems in each big enterprise or business unit get deepening,gradually realize the information system of the internal network and external network information sharing and interconnection and interflow.Many enterprises and institutions of the safe operation of the business completely rely on information system,and can be on the rails,so the growing importance of information security,information security events are occurring,a serious loss for the enterprise or business the unit operations,such as web tampering,computer virus,system illegal intrusion,data leaking,website frauds,services,paralysis and illegal use of loopholes such as information security hidden danger has gradually become the persistent ailment of enterprises information system applications.In this paper,based on security log audit technology,based on the safety of the log audit platform,through the log collection of various application systems,management,analysis and early warning,to realize the protection of major application system.This paper,taking jiangxi province public security department security audit platform as the object,put forward to meet the requirements of the ministry of public security in 2013,from the perspective of the application log audit,establish the public security information system application log security audit platform,realize the behavior and interface to the operation of the user service is a complete record.In public security the launching application system log format,on the basis of design platform of collection interface subsystem,monitoring and control subsystem,audit analysis subsystem.Acquisition interface subsystem USES the docking with the/database application system,by applying the interface or two forms,data interface for the application system log centralized collection;Monitoring management subsystem to achieve corresponding system log collection and operational status of the platform at all levels in monitoring and early warning;For the finalization of log audit analysis subsystem for unified management.
Keywords/Search Tags:Log collection, Analysis of the comparison, Audit management
PDF Full Text Request
Related items