宁夏电信安全管理系统漏洞管理模块的设计与实现
[Abstract]:With the rapid development of information and communication technology, communication network data, terminal intelligence and multimedia service bring new challenges to network security operation. Telecom operators, as national basic network operators, assume important responsibilities and responsibilities in network security. Especially after the three major operators launched 3G 4G mobile broadband service in 2008, the Internet service developed into the fast lane. In order to meet the increasing business demand of users, operators build various information service systems overtime, but the problem of network information security is also increasing. In order to deal with Internet security challenges, enterprises also deploy the corresponding network security products. These security products can meet the security requirements of enterprises to a certain extent or a single network security direction, but can not meet the needs of administrators for the overall security of the network system. On the one hand, security products are independent of each other and lack of centralized and unified management; on the other hand, because the existing asset vulnerability detection capability is completely dependent on the timeliness and initiative of updating the security scanning product signature database, If the vulnerability can not be detected and notified to the security administrator in time when the Internet is published and the security product is updated, the administrator will not be able to protect it in a timely manner, which will bring a great potential network security hazard to the enterprise; more importantly, The management of network security vulnerabilities should have the characteristics of life-cycle management and ensure that every security vulnerability found by an enterprise should be closed loop management. But at present, this work lacks the means and methods of automatic management, which makes it easy to omit or make mistakes in the management work. To strengthen the management of network security vulnerabilities is one of the most important links in the work of telecommunication network security. It is also an important means to actively defend against the threat of network security events and reduce the impact and loss of network security incidents. The purpose of this paper is to design a set of security vulnerability management system module to solve the above problems. Based on the actual security management requirements of Ningxia Telecom, the system designs and implements a vulnerability management module based on the general SSM framework. The system has basic information management, vulnerability collection and input, vulnerability management, log management. System management and other functions. The vulnerability management module collects the Internet alarm vulnerability information in real time, the host computer vulnerability scan result of the telecommunication intranet, the application software vulnerability scan result, the application penetration test result and so on vulnerability information, and the object of the security service provided by the system. That is to say, the vulnerability information of telecom assets is associated with each other so that managers can grasp the safety and health status of the whole network in time and accurately. The system is based on Eclipse visual Java integrated development environment. The SSM integrated framework is used to realize the control layer code logic of the system, and the background database is deployed using the Apache Tomcat platform in the PostgreSQL database management system. Finally, the function and performance of the implemented system are tested to ensure that the implemented vulnerability management module can meet the current security management needs of Ningxia Telecom.
【学位授予单位】:电子科技大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP393.08
【参考文献】
相关期刊论文 前10条
1 肖祥林;;基于SSM的毕业设计管理系统设计与实现[J];电子科技;2016年10期
2 白嘎力;;安全应急响应中心(SRC)是如何运作的?[J];中国信息安全;2016年07期
3 荣艳冬;;关于Mybatis持久层框架的应用研究[J];信息安全与技术;2015年12期
4 徐刚;杨林海;;企业网络安全控制技术分析与应用[J];信息与电脑(理论版);2015年04期
5 董纪英;燕志伟;梁正玉;;SQLite、MySQL、PostgreSQL关系型数据库管理系统比较[J];电脑编程技巧与维护;2014年14期
6 李燕;曹宝香;马兆丰;杨义先;钮心忻;;关联分析算法在安全管理平台中的研究与应用[J];计算机技术与发展;2013年10期
7 罗丽娟;陈永政;;浅谈MVC框架模式[J];科学咨询(科技·管理);2013年02期
8 邹祖军;周伟;;信息系统安全审计机制的实现[J];信息技术;2012年11期
9 徐雯;高建华;;基于Spring MVC及MyBatis的Web应用框架研究[J];微型电脑应用;2012年07期
10 徐锡霆;;以信息系统平台的安全为视角浅析“漏洞”的危害及防范[J];信息与电脑(理论版);2012年01期
相关硕士学位论文 前3条
1 旷庆圆;安全信息与事件管理关键技术研究[D];北京邮电大学;2015年
2 郭俸明;漏洞扫描工具原理与实现[D];中国地质大学(北京);2008年
3 金镜;面向方面的软件进化研究[D];天津大学;2006年
,本文编号:2212035
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2212035.html