Font Size: a A A

The Monitoring And Mamagement System Of Internal Network Security Based On Middleware

Posted on:2014-02-10Degree:MasterType:Thesis
Country:ChinaCandidate:L M LuoFull Text:PDF
GTID:2248330398471964Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet and personal computers, China has become the country has a number of computers. The development of information technology has made people freed from the traditional paper-based work. When compared to the traditional paper-based, Electronic storage media has many advantages because of its small size and high-capacity. Information management has become an essential part of the army, enterprises, banks, universities, and other institution. Admittedly, this has brought great convenience to our daily work, but we should also consider the deficiencies, such as intranet leak problem. Because of the vulnerability of internal rules, intranet leak has become a major threat to the security of the intranet in enterprise.In this paper, the main object of study is the threat to the internal security, including unauthorized computer use, casual use of removable storage devices, information leakage through the network, illegal process used on the internal network attack, unfettered print internal documents, the use of mobile phones and other terminal equipment without permission to access the internal network. Through analysis the existed threats, this paper design a CS mode system with the function of monitoring and management based on ICE middleware by using the Windows driver technology to achieve the core functionality of the system. The system is divided into server side, management side and monitoring side. The main function of the system is completed which can be summarized as the following aspects:(1)The server has complete the ICE interface class, user login authentication and push function. The server, as a core part of the system, provides the information storage and query functions. In order to enhance the efficiency of the system, the push function has achieved the asynchronous transfer function of the system.(2) The management system has finished the user login authentication, the terminal list and audit information shows as well as the management of external storage devices, network port and program strategy. The management system has a simple design and is easy to operate so as to the management staff is convenient to view information and set policies.(3) The terminal system monitor hardware information, external storage devices, network ports and flows, file information, Internet records and Web-mail content. Unlike other application-layer monitoring technology, the system uses the Windows driver technology to achieve the core monitoring functions.The experiment results show that the system has played a good role in hardware information illegal movements, control of removable storage device interface, network leaks and file protection. In a word the system can effectively solve the problem of internal security.
Keywords/Search Tags:Intranet Security, ICE, Monitoring and ManagementSystem Windows Driver Technology
PDF Full Text Request
Related items