当前位置:主页 > 管理论文 > 移动网络论文 >

宁夏电信安全管理系统漏洞管理模块的设计与实现

发布时间:2018-08-29 18:26
【摘要】:随着信息通信技术的快速发展,通信网络数据化、终端的智能化以及业务的多媒体化都给网络安全运营带来新的挑战。电信运营商作为国家基础网络运营企业,在网络安全方面承担着重要的职责和责任。特别是在2008年三大运营商相继开通3G、4G移动宽带业务之后,互联网业务发展进入快车道。运营商为满足用户不断增长的业务需求,对各类信息服务系统加班加点进行建设,但由此所引入的网络信息安全问题也随之增长。为应对互联网安全挑战,企业也部署相应网络安全产品。这些安全产品可以从一定程度或某一个单独的网络安全方向满足企业的安全需求,但无法满足管理员对于网络系统整体安全状况的掌握需求。一方面是由安全产品相互独立,缺乏集中统一管理;另一方面,由于现有资产脆弱性发现能力完全依赖于安全扫描产品特征库更新及时性和主动性,如果漏洞在互联网公布和安全产品更新的窗口期内不能及时发现并通知安全管理员,管理员也无法做到及时防护,这将给企业带来极大网络安全隐患;更重要的是,网络安全漏洞管理工作应具有全生命周期管控的特点,确保企业每发现一个安全漏洞都应该是闭环管理。但目前此项工作缺少自动化管理的手段和方法,这就造成在管理工作中很容易遗漏或出错。加强网络安全漏洞管理是电信网络安全工作中极为重要的环节之一,也是主动防御网络安全事件威胁,降低网络安全事件带来的影响和损失的重要手段。本论文目的在于设计一套安全漏洞管理系统模块来解决上述问题。系统从宁夏电信的实际安全管理需求出发,设计并实现了基于通用的SSM框架的漏洞管理模块,该系统具有基础信息管理、漏洞采集与录入、漏洞管理、日志管理、系统管理等功能。漏洞管理模块通过实时采集互联网预警漏洞信息、电信内网的主机漏洞扫描结果、应用软件漏洞扫描结果、应用渗透测试结果等漏洞信息,与系统所提供安全服务的对象,即电信资产的漏洞信息进行统一关联、展现使得管理人员可以及时、准确掌握全网的安全健康状况。系统基于Eclipse可视化Java集成开发环境。使用SSM集成框架,实现系统的控制层代码逻辑,后台数据库采用PostgreSQL数据库管理系统,WEB应用使用了Apache Tomcat平台来部署。最后对实现的系统进行全面的功能测试和性能测试,保证所实现的漏洞管理模块能够满足宁夏电信当前安全管理工作需要。
[Abstract]:With the rapid development of information and communication technology, communication network data, terminal intelligence and multimedia service bring new challenges to network security operation. Telecom operators, as national basic network operators, assume important responsibilities and responsibilities in network security. Especially after the three major operators launched 3G 4G mobile broadband service in 2008, the Internet service developed into the fast lane. In order to meet the increasing business demand of users, operators build various information service systems overtime, but the problem of network information security is also increasing. In order to deal with Internet security challenges, enterprises also deploy the corresponding network security products. These security products can meet the security requirements of enterprises to a certain extent or a single network security direction, but can not meet the needs of administrators for the overall security of the network system. On the one hand, security products are independent of each other and lack of centralized and unified management; on the other hand, because the existing asset vulnerability detection capability is completely dependent on the timeliness and initiative of updating the security scanning product signature database, If the vulnerability can not be detected and notified to the security administrator in time when the Internet is published and the security product is updated, the administrator will not be able to protect it in a timely manner, which will bring a great potential network security hazard to the enterprise; more importantly, The management of network security vulnerabilities should have the characteristics of life-cycle management and ensure that every security vulnerability found by an enterprise should be closed loop management. But at present, this work lacks the means and methods of automatic management, which makes it easy to omit or make mistakes in the management work. To strengthen the management of network security vulnerabilities is one of the most important links in the work of telecommunication network security. It is also an important means to actively defend against the threat of network security events and reduce the impact and loss of network security incidents. The purpose of this paper is to design a set of security vulnerability management system module to solve the above problems. Based on the actual security management requirements of Ningxia Telecom, the system designs and implements a vulnerability management module based on the general SSM framework. The system has basic information management, vulnerability collection and input, vulnerability management, log management. System management and other functions. The vulnerability management module collects the Internet alarm vulnerability information in real time, the host computer vulnerability scan result of the telecommunication intranet, the application software vulnerability scan result, the application penetration test result and so on vulnerability information, and the object of the security service provided by the system. That is to say, the vulnerability information of telecom assets is associated with each other so that managers can grasp the safety and health status of the whole network in time and accurately. The system is based on Eclipse visual Java integrated development environment. The SSM integrated framework is used to realize the control layer code logic of the system, and the background database is deployed using the Apache Tomcat platform in the PostgreSQL database management system. Finally, the function and performance of the implemented system are tested to ensure that the implemented vulnerability management module can meet the current security management needs of Ningxia Telecom.
【学位授予单位】:电子科技大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP393.08

【参考文献】

相关期刊论文 前10条

1 肖祥林;;基于SSM的毕业设计管理系统设计与实现[J];电子科技;2016年10期

2 白嘎力;;安全应急响应中心(SRC)是如何运作的?[J];中国信息安全;2016年07期

3 荣艳冬;;关于Mybatis持久层框架的应用研究[J];信息安全与技术;2015年12期

4 徐刚;杨林海;;企业网络安全控制技术分析与应用[J];信息与电脑(理论版);2015年04期

5 董纪英;燕志伟;梁正玉;;SQLite、MySQL、PostgreSQL关系型数据库管理系统比较[J];电脑编程技巧与维护;2014年14期

6 李燕;曹宝香;马兆丰;杨义先;钮心忻;;关联分析算法在安全管理平台中的研究与应用[J];计算机技术与发展;2013年10期

7 罗丽娟;陈永政;;浅谈MVC框架模式[J];科学咨询(科技·管理);2013年02期

8 邹祖军;周伟;;信息系统安全审计机制的实现[J];信息技术;2012年11期

9 徐雯;高建华;;基于Spring MVC及MyBatis的Web应用框架研究[J];微型电脑应用;2012年07期

10 徐锡霆;;以信息系统平台的安全为视角浅析“漏洞”的危害及防范[J];信息与电脑(理论版);2012年01期

相关硕士学位论文 前3条

1 旷庆圆;安全信息与事件管理关键技术研究[D];北京邮电大学;2015年

2 郭俸明;漏洞扫描工具原理与实现[D];中国地质大学(北京);2008年

3 金镜;面向方面的软件进化研究[D];天津大学;2006年



本文编号:2212035

资料下载
论文发表

本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2212035.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户5fadb***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com