Font Size: a A A

The Research Of Network Information Security Technology From The Aspect Of E-commerce

Posted on:2020-12-26Degree:MasterType:Thesis
Country:ChinaCandidate:D XiaoFull Text:PDF
GTID:2428330575477888Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of electronic technology and Internet in the world,the Electronic Commerce has become an indispensable business service mode for enterprises and individuals to engage in business and trade activities.However,the security issues of information content and user's personal privacy transmitted by e-commerce in the process of transaction have always attracted people's attention,which not only affects the interests of businesses and customers,but also restricts the development of e-commerce.If the e-commerce is to be widely used and rapidly developed in the world,the security issues must get close attention in real time.On the one hand,the research on the security of e-commerce in the transaction process can improve the theoretical and practical value of e-commerce;on the other hand,it has great practical significance for the global economy and development.In this thesis,the standard is set by the frame structure based on the security issues in e-commerce.And it makes a deep research on the crisis faced by e-commerce as well as the network service technology,security authentication technology,security protocol technology,encryption technology and other security technologies used in the application process of e-commerce.Based on the research of various security technologies of e-commerce,an intelligent defense firewall technology is proposed for the security of e-commerce applications in TCP/IP networks.It takes a real estate transaction e-commerce website as an example to introduce the security mechanism and functional requirements of the e-commerce system in detail.The real estate trading website is an open network.In order to effectively prevent unauthorized users from illegal intrusion and active attack,it establishes three layers e-commerce security mechanism,including data detection layer,data audit layer and security alarm layer.In the data detection layer,it introduces priority privileges through the improved compound password authentication mechanism at the website's Membership Login Center for facilitating and guaranteeing legitimate users' rights,which also rain in the illegal users' behavior.In the data audit layer,the real estate transaction website uses the data security audit mechanism based on the Web e-commerce system,which consists of the data access layer and the data analysis layer.The former layer is the entrance providing a variety of data sources for data security audits.And its main function is to complete real-time data acquisition,collation,aggregation,and garbage data filtering and processing.The latter is the core part of the data audit platform in the network security system of E-commerce of real estate trading website,which mainly completes the data analysis and data audit in the business database.In the security alarm layer,this thesis refers to the security alarm mechanism,which mainly contains two important links: alarm warning and database security backup.The last part is the system test,load test,stress test and performance test.The testing environment of the real estate trading website is mainly to set up a central server in the internal LAN.The clients in the network consist of legitimate users,illegal users and system administrators.And TCP/IP protocol is used to communicate and communicate between the networks.The system administrators can manage,maintain and access the system through browsers.The legitimate users can share the system information and complete the corresponding operations according to their privileges.But the illegal users are trying to invade the website data center illegally or destroy the data center maliciously.The test results show that the security mechanism can effectively prevent the access of illegal users and the malicious modification of personal information and transaction content of legitimate users as well as defend against some common illegal attacks,so as well to protect the legitimate rights of legitimate users and the normal order of real estate transactions...
Keywords/Search Tags:Electronic Commerce, security technology, network security, security protocols
PDF Full Text Request
Related items