涉密計(jì)算機(jī)監(jiān)控與審計(jì)系統(tǒng)設(shè)計(jì)與實(shí)現(xiàn)
發(fā)布時(shí)間:2018-09-10 12:13
【摘要】:近年來(lái),信息安全行業(yè)得以快速發(fā)展,涉密行業(yè)如政府機(jī)關(guān)等對(duì)于信息安全的重視以及對(duì)涉密信息保護(hù)的需求日益增加,由此涉密計(jì)算機(jī)的監(jiān)控與防護(hù)的技術(shù)得以廣泛應(yīng)用。然而,涉密計(jì)算機(jī)監(jiān)控產(chǎn)品往往缺乏及時(shí)有效的防護(hù)和策略制定,同時(shí)產(chǎn)品自身缺乏防護(hù),涉密計(jì)算機(jī)的防護(hù)需要更底層和全面的監(jiān)控手段。涉密主機(jī)監(jiān)控與審計(jì)系統(tǒng)是在這樣的背景下設(shè)計(jì)并應(yīng)用的,它旨在為涉密計(jì)算機(jī)的使用安全、行為監(jiān)控制定全面、底層的保護(hù)方案,為涉密計(jì)算機(jī)提供一個(gè)安全的使用環(huán)境。本文對(duì)涉密計(jì)算機(jī)的監(jiān)控與審計(jì)需求進(jìn)行研究,具體工作及成果包括以下內(nèi)容:(1)提出一種客戶端/服務(wù)器的系統(tǒng)架構(gòu),該系統(tǒng)在客戶端上實(shí)現(xiàn)了多層面、多維度的監(jiān)控,如進(jìn)程監(jiān)控、服務(wù)監(jiān)控、客戶端外聯(lián)監(jiān)控、部分設(shè)備的使用監(jiān)控等,同時(shí)通過(guò)及時(shí)的報(bào)警信息反饋,在服務(wù)器端通過(guò)管理平臺(tái)制定相應(yīng)的保護(hù)策略。并從涉密計(jì)算機(jī)監(jiān)控技術(shù)和服務(wù)器端策略制定下發(fā)兩個(gè)方面保證了涉密計(jì)算機(jī)監(jiān)控與審計(jì)系統(tǒng)的實(shí)用性。(2)對(duì)系統(tǒng)進(jìn)行了詳細(xì)設(shè)計(jì),并在涉密計(jì)算機(jī)客戶端的監(jiān)控部分設(shè)計(jì)了多維度的監(jiān)控模塊,設(shè)計(jì)了服務(wù)器模塊和通信模塊,同時(shí)為了可視化報(bào)警信息和策略的制定,也設(shè)計(jì)了控制臺(tái)界面,可以方便管理策略和報(bào)警信息,分析涉密計(jì)算機(jī)上傳的審計(jì)日志。(3)實(shí)驗(yàn)測(cè)試的結(jié)果體現(xiàn)了系統(tǒng)的安全性、流程的完整性以及實(shí)用性,實(shí)現(xiàn)的系統(tǒng)安全有效,應(yīng)用的場(chǎng)景較廣泛,適用于為目前涉密計(jì)算機(jī)監(jiān)控與審計(jì)提供服務(wù),對(duì)完善并發(fā)展現(xiàn)有的涉密計(jì)算機(jī)監(jiān)控與審計(jì)架構(gòu)技術(shù)具有一定的實(shí)踐和指導(dǎo)意義。
[Abstract]:In recent years, the information security industry has been developing rapidly, the secret industry, such as government agencies, has paid more and more attention to information security and the need for the protection of confidential information has been increasing day by day. Therefore, the technology of monitoring and protecting secret computers has been widely used. However, the secret computer monitoring products often lack timely and effective protection and strategy formulation, at the same time, the product itself lacks protection, and the protection of secret computer requires a lower and more comprehensive monitoring means. The system is designed and applied under this background. It aims to provide a secure environment for the use of secret computers and for the purpose of making a comprehensive and bottom protection scheme for the security and behavior monitoring of confidential computers. In this paper, the monitoring and audit requirements of the confidential computer are studied. The specific work and results are as follows: (1) A client / server architecture is proposed, which realizes multi-level and multi-dimensional monitoring on the client. Such as process monitoring, service monitoring, client outreach monitoring, monitoring the use of some equipment and so on. At the same time, through timely alarm information feedback, the server side through the management platform to formulate the corresponding protection strategy. The practicability of the computer monitoring and auditing system is ensured from the two aspects of the secret computer monitoring technology and the policy formulation of the server. (2) the system is designed in detail. The multi-dimension monitoring module, the server module and the communication module are designed in the client part of the secret computer. At the same time, the console interface is designed in order to make the visual alarm information and strategy. It can easily manage the policy and alarm information, analyze the audit log uploaded by the secret computer. (3) the results of the experiment test reflect the security of the system, the integrity and practicability of the process, the security and effectiveness of the realized system, and the wide range of application scenarios. It is suitable for providing services for the current computer monitoring and auditing, and has certain practical and guiding significance for perfecting and developing the existing computer monitoring and auditing architecture technology.
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2016
【分類號(hào)】:TP309
[Abstract]:In recent years, the information security industry has been developing rapidly, the secret industry, such as government agencies, has paid more and more attention to information security and the need for the protection of confidential information has been increasing day by day. Therefore, the technology of monitoring and protecting secret computers has been widely used. However, the secret computer monitoring products often lack timely and effective protection and strategy formulation, at the same time, the product itself lacks protection, and the protection of secret computer requires a lower and more comprehensive monitoring means. The system is designed and applied under this background. It aims to provide a secure environment for the use of secret computers and for the purpose of making a comprehensive and bottom protection scheme for the security and behavior monitoring of confidential computers. In this paper, the monitoring and audit requirements of the confidential computer are studied. The specific work and results are as follows: (1) A client / server architecture is proposed, which realizes multi-level and multi-dimensional monitoring on the client. Such as process monitoring, service monitoring, client outreach monitoring, monitoring the use of some equipment and so on. At the same time, through timely alarm information feedback, the server side through the management platform to formulate the corresponding protection strategy. The practicability of the computer monitoring and auditing system is ensured from the two aspects of the secret computer monitoring technology and the policy formulation of the server. (2) the system is designed in detail. The multi-dimension monitoring module, the server module and the communication module are designed in the client part of the secret computer. At the same time, the console interface is designed in order to make the visual alarm information and strategy. It can easily manage the policy and alarm information, analyze the audit log uploaded by the secret computer. (3) the results of the experiment test reflect the security of the system, the integrity and practicability of the process, the security and effectiveness of the realized system, and the wide range of application scenarios. It is suitable for providing services for the current computer monitoring and auditing, and has certain practical and guiding significance for perfecting and developing the existing computer monitoring and auditing architecture technology.
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2016
【分類號(hào)】:TP309
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 ;鐵安聯(lián)盟“鐵的安全”系列報(bào)道之四 中央審計(jì)系統(tǒng)[J];計(jì)算機(jī)安全;2004年11期
2 許靜;;捷普新一代信息審計(jì)系統(tǒng)[J];計(jì)算機(jī)安全;2009年08期
3 鐘富堯,李志淮;網(wǎng)橋?qū)徲?jì)系統(tǒng)的設(shè)計(jì)與實(shí)現(xiàn)[J];計(jì)算機(jī)應(yīng)用;2003年11期
4 朱文博;淺析基層人行電子化審計(jì)系統(tǒng)建設(shè)[J];華南金融電腦;2004年03期
5 林飛;教育網(wǎng)審計(jì)分布式解決方案[J];信息安全與通信保密;2005年09期
6 蔣聚e,
本文編號(hào):2234410
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2234410.html
最近更新
教材專著