Dissertation > Excellent graduate degree dissertation topics show

Design and Implementation of Monitoring System for Illegal External Network Access Behavior of Intranet User

Author: DengFangZhi
Tutor: GaoFuXiang
School: Northeastern University
Course: Computer technology
Keywords: Illegal external network access Intermediate driver Security audit
CLC: TP277
Type: Master's thesis
Year: 2013
Downloads: 4
Quote: 0
Read: Download Dissertation

Abstract


The development of computer technology has improved function and ability of information processing of computer, which makes computers be applied to more complex work environment. More and more enterprises have built Intranet to greatly improve working efficiency. However, the negative effect is the security of Intranet. Investigation shows that more than70%of network security events happen in Intranet. The disclosure of company’s data is almost done by company’s own staff. If the staff makes some improper operation such as linking an Intranet host into the Internet in ways that is not allowed and linking an external computer into the Intranet without permission, these behaviors will destroy the integrity of the Intranet, which will result in disclosure of information. Nowadays, since3G network has become more and more popular, the connection between hosts of the Intranet and the Internet is much easier to be implemented. Technical measures should be taken to prevent Intranet from hidden security threat from interior.In order to reduce the threat of illegal external connection, an illegal external connection supervisory system in the Intranet is designed and implemented. This system uses C/S structure, which is comprised of console and central management in the Intranet and monitoring agents which are deployed on the hosts in the Intranet. The functions of the system contain illegal Internet access control, resource management, user management and security audit. Resource management function is in charge of marking the trusted hosts and determining illegal access hosts. The communication of illegal access hosts can be stopped by sending fake ARP message, which is the function of illegal access control. The function of external connection can stop the illegal external connection behavior by NDIS intermediate driver technology and send alarm message to the central server. Moreover, for protecting monitoring agent which is deployed on the hosts from being suspended, the system applies protective measures to the client program. The messages which contain alarm messages that sent by the client and operation of network administrator can be stored in the database as logs. System auditors can analyze these logs. In this thesis system functions are firstly introduced. Then, system structure and module design are proposed, and system database design is described. Moreover, system implementation process is analyzed. Finally, function tests and performance tests are put forward on the basis of software test strategy. These tests can prove that the system has complete function, quick response speed, strong security, strong fault-tolerant ability and good compatibility.

Related Dissertations

  1. The Design and Implementation of Single Sign-On System for Yunnan Mobile Network Operator Platform,TP311.52
  2. Design and Implementation of A Security Audit System for Applications,TP393.08
  3. The Measurement and Analysis of IP Network Traffic,TN915.06
  4. Research and Application of Security Audit Technology for Measuring System Database,TP311.13
  5. The Research of Bypass Network Behavior Monitoring System,TP393.08
  6. Research on ARP Spoofing and Implementation of Security Solution for ARP,TP393.08
  7. Design and Implementation of the Strong Security Auditing System in the Police Business Intranet,TP311.52
  8. Implementation to ARP Protection Based on NIDS Driver,TP393.08
  9. Design and Implementation of the Panzhihua Iron and iron-making system of inspection and analysis,TF51
  10. Network intrusion detection technology research and design implementation,TP393.08
  11. Classified computer network security program design and implementation,TP393.08
  12. 3G technology based mobile ad hoc networks associated interface -driven design and implementation,TN929.5
  13. Research on Audit Record Analysis System Based on Host and Design,TP311.52
  14. The Implement of MSR on Windows CE,TP311.52
  15. Design and Implementation of distributed security audit system data transmission module,TP311.52
  16. The design and implementation of messaging middleware within the network supervision system,TP311.52
  17. Design and Implementation of VPN for Medium-sized and Small Enterprises,TP393.1
  18. Region Features and Impact Factors Research on China’s Securities Audit Market,F832.51
  19. Research and Application of Intrusion Detection Key Techniques in the System of Scientific Instrument State Monitor,TP393.08
  20. Anquan Jiang audit model,TP393.08
  21. Design and Implementation of the Security Audit System of a Server,TP309

CLC: > Industrial Technology > Automation technology,computer technology > Automation technology and equipment > Automation systems > Monitoring, alarm,fault diagnosis system
© 2012 www.DissertationTopic.Net  Mobile