Dissertation > Excellent graduate degree dissertation topics show

Research and Realization of Intrusion Detection Configuration and Log Audit Service System Based on J2EE

Author: XiaoYi
Tutor: WangYongJun
School: National University of Defense Science and Technology
Course: Software Engineering
Keywords: Network Security Isolation Intrusion Detection Configration log audit J2EE/javaEE Struts Hibernate
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 54
Quote: 0
Read: Download Dissertation


With the rapid development of network information communication,there are more and more attacks threatening the security of network.It is hence vital for the security of information network.Based on the principle that trying to improve the connectivity of networks after making sure of its security,the Network Security Isolation Control Equipment which we are developing offers a kind of protection of high level security,by forbidding the access of unauthorized users and intrusion detection.In this paper,Intrusion Detection Configration and Log Audit Service System is researched and implemented based on J2EE/javaEE platform.A standard multi-layer-distributed J2EE/javaEE architecture is proposed after deeply research of the J2EE/javaEE architecture and the J2EE/javaEE technologies which are populating. The Struts framework which implements MVC pattern is the presentation tier.The simple JavaBean is the business logic tier.The DAO pattern and Hibernate framework is the persistence tier.Some essential technologies are introduced and their solutions are provided, including data persistence technology,the operation of report forms and statistics diagram,identity authentication based on USB-KEY,the constitution of compound web pages based on STRUTS Tiles framework.The architecture of the system which is realized finally is simple,the structure is legible and the efficiency is high.It is very congruous to be used by such units as government army and enterprises,because of the characteristics of good portability, extendibility,maintainability,easy-to-use,security.

Related Dissertations

  1. Design and Realization of Human Resource Management System,TP311.52
  2. Track and Field Games General management system,TP311.52
  3. Design and implementation of SSH-based image log marketing system,TP311.52
  4. SSH-based office automation system design and implementation of bilingual,TP311.52
  5. Based on the Struts Architecture Design and Implementation of Online Examination System,TP311.52
  6. Scientific and Technological Information Management System Design and Implementation,TP311.52
  7. E-commerce design and implementation of online bookstore,TP311.52
  8. J2EE-based removable storage devices electronic document security management system design and implementation,TP311.52
  9. Based on the MVC design pattern blog system design and implementation,TP311.52
  10. Internet banking customer service system design and implementation,TP311.52
  11. MVC design pattern based electronic evaluation system works Design and Implementation,TP311.52
  12. SSH-based multimedia classroom feedback system architecture design and implementation,TP311.52
  13. The Design and Implementation of Urban Passenger Transportation Management System for Binzhou City,TP311.52
  14. Human resources management system based on J2EE platform design,TP311.52
  15. Rremote Monitoring Peiliao Control System Based on LABVIEW and AJAX,TP277
  16. Web - based rotating machinery inspection system key technology research,TP274.4
  17. The Research and Implementation of Web Application Based on Lightweight J2EE Framework,TP393.09
  18. Employee Management System Design and Implementation,TP311.52
  19. Online Examination System Design and Implementation,TP311.52
  20. Design and implementation of the management system based on the the STRUTS framework of the contract,TP311.52
  21. Ontology-based online examination mechanism,TP311.52

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile