中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/8614
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 80990/80990 (100%)
Visitors : 42694899      Online Users : 1486
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/8614


    Title: 網路監控程式設計與實作;Design and Implementation of a Network Monitoring System
    Authors: 曾達品;Da-Ping Tseng
    Contributors: 資訊工程學系碩士在職專班
    Keywords: 網路監控程式;正規規格;軟體工程;Rational Unified Process;Formal Specification
    Date: 2003-07-10
    Issue Date: 2009-09-22 11:31:46 (UTC+8)
    Publisher: 國立中央大學圖書館
    Abstract: 網際網路日益興盛,人們利用它提供各式各樣的服務,也從網際網路上使用各種服務,企業的運作亦由過去傳統的商務模式,進入電子商務的時代,企業內部的運行溝通,都基於網路基礎架構,而整個人類生活上的活動,都與網路息息相關,也因此網路的安全,就更顯得重要。本論文實作網路監控程式,對於防阻駭客,保護企業組織內部網路的安全,以及利用網路監控程式來模擬駭客入侵,以驗證網路安全性的高低,具有良好正面的意義。 在論文中討論的內容包括三部份:一是遵循Rational Unified Process (RUP)模式,發展「網路監控程式」系統。二是「網路監控程式」系統的分析,以Unified Modeling Language (UML) Use Case來分析使用者需求,並將之轉換成Z描述的正規規格(Formal Specification),以檢驗使用者需求的規格是否正確。三是「網路監控程式」系統的設計與實作,以UML Class Diagram來設計系統規格,並透過Java語言來實作。包括系統規格、系統測試及手冊。其中Z的Formal Specification將是本論文的重點。 Internet has become more popular day by day , people use it to provide various services. Due to the utilization of Internet, the business operation has gradually changed to e-business model from traditional business. The internal communication within a business was based on the network framework, the human life and their activities were more relevant to the network also. Therefore, The security of network is become more important than before. The thesis ‘Network Monitoring Program” will bring good benefits and impacts on preventing network attack, securing internal business network safety, as well as using hacker attack simulated program to test the security of network. In my treatise includes : (1) follow Rational Unified Process (RUP) to develop “Network Monitoring System”. (2) perform system analysis of this system by Use Case, and transform the Z formal specification to check the consistence. (3) design and implement this system by means of UML Class Diagram, and Java language.
    Appears in Collections:[Executive Master of Computer Science and Information Engineering] Electronic Thesis & Dissertation

    Files in This Item:

    File SizeFormat


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明