透過您的圖書館登入
IP:3.15.219.217
  • 學位論文

建置一個開放式空間的網路資源使用的稽核系統

Construct an Audit System for Network Resource Management in Open Space

指導教授 : 陳瑞發

摘要


近年來隨著無線網路的普遍化,不僅許多大專院校提供無線上網的服務,M-Taiwan計劃更是想將台灣塑造成一個無線行動通訊島,建構全民無線寬頻上網的環境,讓民眾在開放式空間下可隨時隨地的上網,但是也衍生出了許多問題,例如下載散佈非法軟體。因為欠缺管控的機制,網路管理者往往不容易查得網路非法使用者,並對非法行為進行即時性的封鎖。 因此本論文提出一個開放式空間的網路資源使用的稽核系統,主要包括使用者必須使用具個人身分資訊的實體物件進行註冊、認證與使用網路的架構與程序,對於使用者進行非法行為,可立即性的管控封鎖,並提出網路管理者在管理網路環境時的所需注意的管理方針。

並列摘要


Wireless network is popular in recently years. Not only universities support the wireless network service, but also the project M-Taiwan would to make Taiwan to be a wireless Island. The purpose of this project is "people can surf on the internet anytime anywhere." But there are some additional crimes, such as unauthorized to share/download files, ex. movies, music, game...etc. Because network supervisors have no a well-done management mechanism, they are hardly in real time to know who do it and to block him. In this thesis, we proposed an audit system for network resource management in open space. People must use entity with personal identity to register and authenticate. The audit system will block users in real time if someone does unauthorized processes. According to the registered information, network supervisor can know who do it. We also propose the management policy for network supervisor to manage network.

參考文獻


[Gil 03] Younhee Gil, Dosung Ahn, Sungbum Pan, Yongwha Chung, “Access Control System with High Level Security Using Fingerprints,” Applied Imagery Pattern Recognition Workshop, 2003. Proceedings. 32nd, pp238-243, Oct. 15-17, 2003.
[Hollingsw-orth 09] Karen P. Hollingsworth, Kevin W. Bowyer, Patrick J. Flynn, “The Best Bits in an Iris Code,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 31, No. 6, pp.964~973, June 2009.
[Jain 04] A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric
recognition,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, pp. 4-20, Jan. 2004.
[Juang 08] Wen-Shenq Juang, Sian-Teng Chen, and Horng-Twu Liaw ,“Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards,” IEEE Transactions on Industrial Electronics, Vol. 55, No. 6, pp2551-2556, June 2008.

延伸閱讀