Font Size: a A A

Design And Implementation Of The Inner-net Host Secrecy System

Posted on:2009-08-04Degree:MasterType:Thesis
Country:ChinaCandidate:W Y WanFull Text:PDF
GTID:2248330392961898Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along with the rapid popularization of information application technology,information security is gaining more and more recognition from both governmentsand enterprises. According to the result of an international authorized organization’sinvestigation to the network security, more than85%of the security threat comesfrom the inside of the units. Frequent occurrence of inner net security incident makesinner net security problem become the most active one in information security field,and it is also the most urgent problem needs to be solved.There is a plenty of inside information resource on the inner net of thedepartment S. It’s very important to secure the secrecy of the inner net informationthrough the effective management and supervision on the host computer withoutdisturbing its normal operation. Combined with the problems of the inner net security,four factors aiming at enhancing the inner net secrecy of the department S areproposed here. They are named as confidentiality, creditability, controllability andreliability. The content and the goal of system development are also settled down. Thekey point for inner net security is the enhancement of the supervision of hostcomputer users’ activity.The network security principle and technology are discussed first, including theconcept of network security, hiberarchy, security model and security keepingmechanism. Then the key techniques of the inner-net secrecy system are studied. Theconstruction of the Windows operating system and the techniques of the WindowsAPI, Hook are investigated. The techniques of sifting drive, software hiding andRootkit are also discussed here.An inner-net secrecy system based on host proxy is designed and realized here.The software construction of the system is given and the modules are designed. Themodularization design concept can make the system have a better expansibility. Therealization of the function of the host proxy module is the keystone. Windows APItechnique is used to supervise the application layer. HOOK technique is used to supervise the kernel drive layer. Double protection method of system service andregister table is used to protect host proxy program. RC4flow encryption/decryptionarithmetic is used to encrypt the files on movable disks. Winpcap technique is used towatch the outward join and the illegal entrance to the host computer. Through theselection of technology, perfect the system function requirement. For users to host andnetwork system performance is greatly reduced.In the end, the system is tested and analyzed. In the testing environment, functioncase test and performance test are carried out, and the testing results are analyzed.This system adopts amity UI, sustains safety scheme and dynamic refreshing. It isconveniently operated and it supervises precisely, stably and reliably. The system caneffectively control and manage the user behavior.The research output of this paper has been used by several governmentdepartment and enterprises. After further improvement, this system will have aprosperous application future in army, police, security and other fields which havespecial requirement for information safety.
Keywords/Search Tags:Inner-net, Secrecy, Hook, Rootkit
PDF Full Text Request
Related items