Abstract

In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. This study introduces the working principle of the network security monitoring system, analyzes the key technologies involved in the system development process and network programming technology, gives the overall architecture of the system, and designs the processing flow of the monitoring function. The test and analysis of the system show that the design of the system has achieved the expected design goal. The design of the system has achieved the expected design goal. The five test points can meet the standard time specified in the demand analysis process. The time difference of all module test points in the test is less than 3 s. The system can realize the remote acquisition and real-time monitoring of the network access, file system operation, system operation status, and other information of the controlled computer. Through the test and analysis of the system, it is shown that the system has achieved the expected design goal, the working state problem, and can meet the functional requirements of internal network security monitoring. It can be applied to enterprises, institutions, and departments that have higher requirements for intranet information security.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call