Font Size: a A A

The Research Of Intrusion Detection Technology Based On CCSDS AOS Space Network

Posted on:2012-08-31Degree:MasterType:Thesis
Country:ChinaCandidate:G Y XiaoFull Text:PDF
GTID:2178330338450018Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the continuous development of space shuttle technology, the scale of space communication network also has increased. The current space network system is composed of satellites ground stations and planes, airships and Leo satellite constitute consisting of additional links which is in different orbit, complete different missions that are composed of hybrid network, according to the space information resources, via space information communication links, forming intelligent, independent operating communication network.Among them, the additional link which consists of airship plane and Leo satellite is established according to the needs, mainly used for forwarding information between satellites and ground station. So near space network is an important part of space communication network system. This network has dynamic structure topology, multiple hops and no center self-organized characteristic. Because of the space communication network is extensively applied in many fields, the network security research has become the focus of attention, among them, owing to unique dynamic network topology of near space network, make it face more security threats.This thesis firstly summarized the background, structure, characteristic of near space network. Then, aims at the threats of near space network, the emphasis of impending space network SCPS-NP protocol is analyzed, and combining with the network characteristics which expand the near space SCPS-NP protocol security. Subsequently, combined with expanded SCPS-NP protocol, the thesis presented a suitable clusters algorithm in the near space network, and based on this, presented an improved intrusion detection strategy based on cluster. Via electing cluster head nodes in a random jump range, making use of cluster-heads monitor network nodes, and can prevent the invasion of attack in the network. Finally, making use of the OPNET network simulation software simulate and implement the clusters election and intrusion detection strategy. Simulation results show that the strategy can effectively reduce the load caused by the network intrusion and improve network throughput and delay performance.
Keywords/Search Tags:Cluster, Near space network, Intrusion detection, Network protocol
PDF Full Text Request
Related items