Dissertation > Excellent graduate degree dissertation topics show

Security Audit in Information System

Author: YangZhengPeng
Tutor: WangZuo
School: Xi'an University of Electronic Science and Technology
Course: Computer System Architecture
Keywords: Security Audit Public Key Infrastructure Intrusion Detection Log Recording
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 130
Quote: 1
Read: Download Dissertation


As all the countries take the security of the information systems into seriousconsideration, it shows that the leakiness of the secrets and the intrusions from theorganization members always account for a large scale in the security problems. Toprevent this, it is extremely important to enhance the security audit procedure for usingprocess of the inner information in a system.Security audit is one of the most important parts in the field of information security.Firstly, it records everything faithfully and uninterruptedly including users’operationsand other activities happened both in the local computer system and related network.After the event, various means and technologies are used to analyze the data which hasbeen collected automatically. At last, the result can be employed as solid testimony totell the truth whether the information system has been cracked or some users deny theirown activities. Though this method is passive to the attackers in the network, it is agreat help to trace network crimes, and it also deters the stuff from doing the bad things.Therefore it is of great importance to study computer security audit technology.Be carefully analyzing the current accomplishment in the field of security audit, wepresents a possible architecture of security audit system based on Ukey which candeployed in network server in the paper. There are mainly three modules in the system:data collection module, analysis engine module and information publication module.Data collection module is designed for distributed network model, it may have severaldistributed audit collector. Analysis engine module is based on rule libraries to detectpotential security violation, find out the matching pattern, detect the security events, andrecord the security audit trail. Information publication module supplies review andquery of original audit data and audit alert trail to those authorized user. There are threeuser roles including common user, security administrator and system administrator withdifferent priority. Information publication is based on World Wide Web with audit alerttrail.

Related Dissertations

  1. Intrusion detection based on the ultrasonic echo envelope in the military security patrols,E919
  2. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  3. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  4. The Research on Intrusion Detection System Based on Machine Learning,TP393.08
  5. Intrusion Detection in Mobile Ad Hoc Networks: A Timed Finite State Machines Approach,TN929.5
  6. An Intrusion Detection System for High-Speed Networks,TP393.08
  7. Research on the Security in Wireless Sensor Network,TN915.08
  8. Sensitivity Analysis and Application of Orthogonal Weight Function Neural Network,TP183
  9. E-government network security instant messaging system design and implementation,TP393.08
  10. The Study of Intelligent Intrusion Detection System Based on Neural Network in Linux,TP393.08
  11. Petri net -based network intrusion detection system Research and Implementation,TP393.08
  12. FSVM -based data mining method and its application to intrusion detection research,TP393.08
  13. Web-based intrusion detection system logs Design and Implementation,TP393.08
  14. IPv4-IPv6 transition technologies CIDF Based Intrusion Detection System,TP393.08
  15. Intrusion detection based on data mining technology research,TP393.08
  16. Mechanisms based on trust metrics Research and Implementation of Intrusion Detection System,TP393.08
  17. PetroChina Xinjiang Branch Certificate Application Management System Design and Implementation,TP311.52
  18. Research on Parallel and Distributed Intrusion Detection Technologies,TP393.08
  19. Attribute Reduction Based on Rough Set and Weighted SVM intrusion detection method,TP393.08
  20. Research of Intruding Detection Based on DCA and NSA Algorithm,TP393.08
  21. Research on Intrusion Detection Based on Protocol Analysis and Immune Principle,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile