淡江大學機構典藏:Item 987654321/35125
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64178/96951 (66%)
Visitors : 9397792      Online Users : 7560
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/35125


    Title: 建置一個IP/MAC Address 管控與認證系統整合之環境
    Other Titles: Construct an integrated environment for IP/MAC address management and authorization system
    Authors: 黃泰然;Huang, Tai-jan
    Contributors: 淡江大學資訊工程學系碩士班
    陳瑞發;Chen, Jui-fa
    Keywords: 使用者認證;網路管控;入侵偵測系統;稽核;Authorization;IP/MAC Address Management;Intrusion Detection System;Audit
    Date: 2009
    Issue Date: 2010-01-11 06:02:48 (UTC+8)
    Abstract: 在網路世界中,電腦的管控與杜絕網路資料非法存取日趨重要。目前大多數的網路管理方法,大多只能單獨取得電腦IP/MAC address或使用者登錄/登出資料,欠缺一個整合的管控機制,網路管理者無法即時得知使用者上線狀況及行為。
    因此,本論文提出一個IP/MAC Address管控與使用者認證系統整合的環境架構,當使用者登入了網路之後,確實的對應IP/MAC Address與使用者之間的關係,有效且即時的管控網路上電腦設備與使用者的行為狀況。我們所提出的整合系統除了可以將IP/MAC Address管控與使用者認證系統進行整合外,並且可以對於非法使用者的電腦進行即時性的封鎖,網路管理者也能夠從資料庫內的訊息紀錄產生出網路用戶活動的稽核報表。
    How to manage computers and eliminate unauthorized access on network are important topics recently. Most of the network management products only can get either the host IP/MAC address or user information. Network supervisors are hardly in real time to know who is online or what he has done.

    In this thesis, we proposed an environment that integrated IP/MAC address management system and authorization system. The proposed environment binds IP/MAC address and user account when user logon from network, and monitors user behavior on network. If hosts or users have unauthorized accesses on the proposed environment, network supervisor can block them in time to protect the network resources. It also can generate reports of auditing from database to review the status of network.
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Thesis

    Files in This Item:

    File SizeFormat
    0KbUnknown382View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback