Dissertation > Excellent graduate degree dissertation topics show

The Research and Implementation of Graphical Management and Audit System on Network Security Isolation Device

Author: GaoYanChun
Tutor: WangYongJun
School: National University of Defense Science and Technology
Course: Computer technology
Keywords: Network Security Network Isolation Technology GUI Management and Audit ADO SOCKET
CLC: TP393.08
Type: Master's thesis
Year: 2007
Downloads: 20
Quote: 0
Read: Download Dissertation

Abstract


Along with our country’s digital government, the on-line bank, electronic commerc, the on-line education and the army direction network speeding up and popularizing, the network has already become a vital tool for the peple to work, to study and to live. However, due to the open structure and standard of the Internet, various problems are emerging in endlessly. At same time, all these are threatening the computer system and the network security. For example, the back door question, the hacker attacking behavior, the virus infection and destruction, the user misoperation and so on. For some departments such as the government, the army, the communication, the finance, the enterpriseand the customs, which have the important data message, in order to guarante the information security, people have developed network isolation technology to effectively isolate inner and outer network.Because the network security isolation equipment is very complex, if there lacks the graphical management and disposition interface which is simple to use for the commom user who does not have the network security knowledge, it is very difficult to operate with the equipment. This article, which takes the project about some network security isolation equipment as a background, is writed about the design and implement of the graphical management and audit system to satisfy the requirement of the equipment. The system has adopted some pivotal technologies such as ADO and SOCKET, solved some problems such as the database multi-tables operation and real time communication without blocking, implemented the functions such as equipment state monitoring, strategy disposition, log management and audit, account management and system administration.According to system test and the actual probation, the graph management and audit system has achieved the design goal well, and greatly enhanced the usability of the network security to isolate the equipment and built the firm foundation for its large-scale application.

Related Dissertations

  1. The Research of Fault-Tolerant Techniques for Parallel/Distributed Network Simulator PDNS,TP302.8
  2. The Development of Soft System for Power Load Management Terminal Testing Device,TP311.52
  3. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  4. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  5. Gui Design and Application Oriented to Embedded Ultrasonic Detecting System,TP274.53
  6. Professor Li Gui academic experience and the temperature and lung circulation Dingchuan the clinical study of treatment of children with bronchiolitis,R249.2
  7. The Design of Embedded Image Transmission Terminal Based on the TCP/IP Protocol,TP368.1
  8. Research and Design of Communication Middleware on AFC System,TP311.5
  9. The Research and Application of Software Reliability Test for User Right Management System,TP311.53
  10. Region-based wireless sensor network key management scheme for research,TP212.9
  11. SX Provincial Public Security Bureau Network Security Corps Performance Evaluation Index System Design,D631.1
  12. The Research of Insurance Network Marketing of China Insurance Company,F724.6
  13. Design of Digital Intelligent Terminal System Doorstation,TP368.1
  14. The Design and Implementation of OpenBASE Enterprise Manager,TP311.52
  15. The Design and Implementation of Email Analysis and Forensies System,D918.2
  16. Research and Implementation based on scientific research management system of institutions . NET,TP311.52
  17. Zhongshan City, the development and implementation of the patrol police crime prevention and control system of quality assessment,TP311.52
  18. Research and Implemention of Information Security Encryption System Based on the RSA,TP309.7
  19. The Research of Attack Source Traceback in Distributed Denial-of-Service Attacks Based on VoIP,TP393.08
  20. Research on Streaming Media Detection Methods Against DoS\DDoS Attack Based on Analysis of Self-similarity,TP393.08
  21. Firewall and three switch - based campus network security policy research,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile