Font Size: a A A

Based On The Ipv4 Network Security Management System Design And Realization

Posted on:2007-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:H L WangFull Text:PDF
GTID:2208360185956620Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, network becomes the most primary tool step by step for information interchanging. Many enterprises have built their own LANs to share resource and collaborate. However, at the beginning of design, engineers neglected security problems. So there are numbers of hidden troubles in the TCP/IP protocol group. Now network security problems restrict the network development heavily.The factors which cause network security problems to LANs used by enterprises come from not only out of these LANs, such as hacking or virus infection, but also inner of them, and the later is more concealed, more difficult to discover, and then come out more damage.It is usually in reality that there is not enough attention taken to the security threats come from the inner of networks, and are no relevant regulations and management mechanisms. This is because beacuase of the neglect about security problems of the inner network, the lack of the knowledge of network security, and there is no system which is practical and easy to use could resolve these problems effectively. The main purpose of this paper is designing a system of LAN security audit and management to resolve these problems fundamentally. The following functions are provided in this system:Authorization–management: which operation is allowed to a particular user on variant resources of variant hosts is decide by this function. The authorization–management is centralize and based on roles.Auditing: operations performed by users are stored in security log; administrator could audit user behavior based on the log.Remote Monitoring: administrator could remotely get user operations and host status, kill process on hosts, lock/unlock hosts and shutdown hosts.Network Monitoring: detecting illegal hosts and sniffers, supporting across sub network monitoring, and blocking network connecting of illegal hosts.In additional, the Identification-authentication mechanism based on user/password...
Keywords/Search Tags:Identification Authentication, RBAC, Network monitoring, ARP
PDF Full Text Request
Related items