Font Size: a A A

Design And Implementation Of System For Audit Of Operation And Maintenance Based On Application Virtualization

Posted on:2019-06-03Degree:MasterType:Thesis
Country:ChinaCandidate:T JiangFull Text:PDF
GTID:2428330548970032Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Under the information age,the rapid development of informatization construction of major enterprises and the increasing operation and maintenance of intranet operation audits have also led to the increasing frequency of tools used for accessing inquiries,such as IE,Oracle and Navicat.Although,along with the operation and maintenance tools that facilitate the operation of operation and maintenance personnel,it inevitably also poses a potential safety hazard caused by improper operation or malicious attacks.In order to ensure the lasting and reliable operation of the internal system,enterprises inevitably need to record the operation and maintenance personnel 's operation.However,the original method of auditing the protocol is adopted.When the protocol used by Oracle and Navicat is complicated and varied,it becomes more and more difficult.Therefore,in order to achieve the audit function while saving project costs and reduce the difficulty of system development,operation and maintenance audit based on application requirements based on the application virtualization architecture,virtual agent,video audit and input data interception combined for the operation and maintenance audit system Provide the most suitable solution.This paper first introduces the typical security risks existing in the internal network access of major enterprises,analyzes the current status of application virtualization technology and O&M audit system,and puts forward the operation and maintenance security audit method based on application virtualization.Then it studies the operation and maintenance auditing system based on the application virtualization architecture based on the application virtualization technology,the portraits recording method,the network call plug-in technology,the clipboard interception mechanism,the network communication technology,etc.Based on this,the system is divided into portrait capture,clipboard data interception,protocol proxy and monitor playback four modules.Finally,on the basis of this design,the functions of related modules are realized,and the functions and performance tests are completed.The targets of monitoring,reviewing,process recording and operation task replaying are achieved.
Keywords/Search Tags:audit of operation and maintenance, video audit, application virtualization, data interception, protocol agent
PDF Full Text Request
Related items