| With the development of Internet in China, it has become one of the most indispensable tools in people's daily life and work. It brings so much convenience to people. However, because of its opening and the great amount of data, there is also much baleful data. Further more, some people spread vicious information and commit crime via Internet. To provide a favorable Internet circumstance, the police not only needs to consummate the interrelated laws, but also needs more effective techniques to achieve the control. To fit the requirements of police, we developed "the Network Information Monitor System". This paper analysed the police requirements based on the application, and designed "the Network Information Monitor System"with appropriate techniques. The system adopted J2EE system, which is a web application based on BS structure. The data collection is completed by the device probe, which is built in the mirror port of the switch's out port. In this way, the copies of all the data packages that pass in and out via the switch will be sent to the probe. The probe will analyse the data packages received, and estimates the protocol types of them. After that, the data packages will be resolved according to the protocols and then will be reverted. The probe can analyse the data according to the alert policy that has been saved in local database, and send alerts to the server when the alert conditions are fitted. All the Internet behaviors that have been captured by the probe will be recorded to local database. The alerts received by the server are also saved to the database of the server. The system manages the place that needs to be controlled according to the zone. The users are given the property of zone, and they can only deal with the operations of their zone. There are two types of users: administrator and operator. The administrator is able to manage the system, whereas the operator can only operates part of the system, but not manage the system. The system can be divided into six modules according to its function: user management module, area manage module, Behaviour monitor module, web page security module, virtual server security module and interactive module such as BBS. The user management module provides the administrators the function of user management. With this module, the administrators can create new users... |