透過您的圖書館登入
IP:13.58.77.98
  • 學位論文

建置一個IP/MAC Address 管控與認證系統整合 之環境

Construct an Integrated Environment for IP/MAC Address Management and Authorization System

指導教授 : 陳瑞發

摘要


在網路世界中,電腦的管控與杜絕網路資料非法存取日趨重要。目前大多數的網路管理方法,大多只能單獨取得電腦IP/MAC address或使用者登錄/登出資料,欠缺一個整合的管控機制,網路管理者無法即時得知使用者上線狀況及行為。 因此,本論文提出一個IP/MAC Address管控與使用者認證系統整合的環境架構,當使用者登入了網路之後,確實的對應IP/MAC Address與使用者之間的關係,有效且即時的管控網路上電腦設備與使用者的行為狀況。我們所提出的整合系統除了可以將IP/MAC Address管控與使用者認證系統進行整合外,並且可以對於非法使用者的電腦進行即時性的封鎖,網路管理者也能夠從資料庫內的訊息紀錄產生出網路用戶活動的稽核報表。

並列摘要


How to manage computers and eliminate unauthorized access on network are important topics recently. Most of the network management products only can get either the host IP/MAC address or user information. Network supervisors are hardly in real time to know who is online or what he has done. In this thesis, we proposed an environment that integrated IP/MAC address management system and authorization system. The proposed environment binds IP/MAC address and user account when user logon from network, and monitors user behavior on network. If hosts or users have unauthorized accesses on the proposed environment, network supervisor can block them in time to protect the network resources. It also can generate reports of auditing from database to review the status of network.

參考文獻


[Kim 05] Byung-joo Kim, Il-kon Kim, “Kernel Based Intrusion Detection System,” Computer and Information Science, 2005. Fourth Annual ACIS International Conference on, pp.13-18, Apr. 2005
[Solomon 98] Solomon, D.A., “The Windows NT Kernel Architecture,” IEEE Computer Society, Vol. 31, pp.40-47, Oct. 1998
[VOKOROKOS 06] Liberios VOKOROKOS, Anton BALÁŽ, Martin CHOVANEC, “INTRUSION DETECTION SYSTEM USING SELF ORGANIZING MAP,” Acta Electrotechnica et Informatica, No. 1, Vol. 6, 2006
[IMSS 09] Information Management Systems and Services. [Online]. Available: http://imss.caltech.edu/cms.php?op=wiki&wiki_op=view&id=412
[Salim 09] Mohammad Salim, M Sana Akhtar and Mohammed A Qadeer, “Data Retrieval and Security using Lightweight Directory Access Protocol,” Knowledge Discovery and Data Mining, 2009. Second International Workshop on, pp.685-688, Jan. 2009

延伸閱讀