證券業(yè)務(wù)安全管理平臺(tái)的設(shè)計(jì)與實(shí)現(xiàn)
本文關(guān)鍵詞: 證券系統(tǒng)安全 網(wǎng)絡(luò)安全 訪問控制 入侵檢測(cè) 安全防御體系 出處:《上海交通大學(xué)》2014年碩士論文 論文類型:學(xué)位論文
【摘要】:隨著證券金融業(yè)在我國(guó)的迅猛發(fā)展,,計(jì)算機(jī)技術(shù)和網(wǎng)絡(luò)技術(shù)在證券業(yè)務(wù)中的應(yīng)用也變的越來(lái)越廣泛。由于證券業(yè)務(wù)的安全性關(guān)系到個(gè)人、機(jī)構(gòu)及國(guó)家的利益,并且具有實(shí)時(shí)性、安全性要求高的特點(diǎn),所以證券業(yè)務(wù)的安全問題成為了一個(gè)重要的研究方向。目前證券業(yè)務(wù)主要有存在的安全問題包括:病毒傳播、信息泄漏或丟失、非授權(quán)訪問、惡意攻擊和入侵、破壞數(shù)據(jù)完整性等等。 本文根據(jù)證券業(yè)務(wù)的安全需求,參照應(yīng)用最新的計(jì)算機(jī)技術(shù)和信息網(wǎng)絡(luò)安全方面的技術(shù),對(duì)我國(guó)證券業(yè)務(wù)安全管理平臺(tái)進(jìn)行了研究,并提出了證券業(yè)務(wù)安全管理平臺(tái)的安全防御體系模型,以防火墻系統(tǒng)、安全漏洞評(píng)估系統(tǒng)、入侵檢測(cè)系統(tǒng)、身份認(rèn)證系統(tǒng)和網(wǎng)絡(luò)邊界安全控制系統(tǒng)來(lái)構(gòu)成的安全防御體系模型。證券業(yè)務(wù)安全管理平臺(tái)為了提高系統(tǒng)的安全性,還根據(jù)P2DR(Policy、Protection、Detection、Response)安全模型的特點(diǎn),通過降低處理時(shí)間和檢測(cè)時(shí)間來(lái)實(shí)現(xiàn)證券業(yè)務(wù)的網(wǎng)絡(luò)安全,由此提出了入侵檢測(cè)系統(tǒng)的設(shè)計(jì)方案,并且對(duì)入侵檢測(cè)系統(tǒng)進(jìn)行了重點(diǎn)研究。 本文設(shè)計(jì)的證券業(yè)務(wù)安全管理平臺(tái)集成了多類安全技術(shù),能夠?qū)Χ鄠(gè)信息源數(shù)據(jù)進(jìn)行安全分析,并與其他多種安全技術(shù)進(jìn)行協(xié)作完成異常事件的響應(yīng)和報(bào)警。其次,證券業(yè)務(wù)安全管理平臺(tái)形成了多層次縱深信息安全防御機(jī)制,從而形成證券業(yè)務(wù)安全管理平臺(tái)的整體性安全構(gòu)架。最后根據(jù)對(duì)證券業(yè)務(wù)的安全需求分析,本文對(duì)構(gòu)建的證券業(yè)務(wù)安全管理平臺(tái)進(jìn)行了測(cè)試,從而驗(yàn)證了設(shè)計(jì)方案的可行性和可靠性。
[Abstract]:With the rapid development of securities finance in China, the application of computer technology and network technology in securities business is becoming more and more extensive. Because the security of securities business is related to the interests of individuals, institutions and countries. And with the characteristics of real-time and high security requirements, the security of securities business has become an important research direction. At present, the main security problems in securities business include: virus transmission. Information disclosure or loss, unauthorized access, malicious attacks and intrusions, data integrity and so on. According to the security requirements of securities business, this paper studies the security management platform of securities business in China, referring to the application of the latest computer technology and information network security technology. And put forward the security defense system model of security business security management platform, to firewall system, security vulnerability evaluation system, intrusion detection system. Identity authentication system and network border security control system to form a security defense system model. Security business security management platform in order to improve the security of the system, but also based on P2DRN Policy. The characteristics of ProtectionDetectionResponse) security model can realize the network security of securities business by reducing the processing time and detecting time. The design scheme of intrusion detection system (IDS) is put forward, and the intrusion detection system (IDS) is studied emphatically. The security management platform designed in this paper integrates many kinds of security technologies and can analyze the security of multiple information sources. And cooperate with other security technologies to complete the response and alarm of abnormal events. Secondly, the security management platform of securities business formed a multi-level defense mechanism of information security in depth. Finally, according to the analysis of the security requirements of securities business, this paper tests the security management platform of securities business. The feasibility and reliability of the design are verified.
【學(xué)位授予單位】:上海交通大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 王能江;;計(jì)算機(jī)網(wǎng)絡(luò)教室的組建和維護(hù)[J];電腦知識(shí)與技術(shù)(學(xué)術(shù)交流);2007年10期
2 趙亮;汪國(guó)安;;基于分布式數(shù)據(jù)庫(kù)的入侵檢測(cè)系統(tǒng)[J];電腦知識(shí)與技術(shù);2009年24期
3 范艷芳;韓臻;曹香港;何永忠;;基于時(shí)間限制的多級(jí)安全模型[J];計(jì)算機(jī)研究與發(fā)展;2010年03期
4 張翼;張勇;汪為農(nóng);;防火墻過濾規(guī)則的建模和全面優(yōu)化[J];計(jì)算機(jī)工程與應(yīng)用;2006年06期
5 潘煒;李偉華;;網(wǎng)絡(luò)安全聯(lián)動(dòng)模型的設(shè)計(jì)與應(yīng)用[J];計(jì)算機(jī)科學(xué);2006年05期
6 顏學(xué)雄;王清賢;馬恒太;;Web服務(wù)訪問控制模型研究[J];計(jì)算機(jī)科學(xué);2008年05期
7 董理君;余勝生;杜敏;周敬利;;一種基于環(huán)境安全的角色訪問控制模型研究[J];計(jì)算機(jī)科學(xué);2009年01期
8 單智勇;;遵循CC標(biāo)準(zhǔn)的安全操作系統(tǒng)安全管理框架[J];計(jì)算機(jī)工程;2007年09期
9 王衛(wèi)平,陳文惠;防火墻規(guī)則配置錯(cuò)誤分析及其檢測(cè)算法[J];計(jì)算機(jī)應(yīng)用;2005年10期
10 廖志芳;樊曉平;謝岳山;楊璽;張恒;;計(jì)算機(jī)聯(lián)網(wǎng)審計(jì)組網(wǎng)模式的建立[J];計(jì)算機(jī)應(yīng)用;2006年04期
本文編號(hào):1477635
本文鏈接:http://www.sikaile.net/guanlilunwen/ydhl/1477635.html