Font Size: a A A

The Research Of Network Security And Vulnerability Check Technologies

Posted on:2015-11-22Degree:MasterType:Thesis
Country:ChinaCandidate:M Y GaoFull Text:PDF
GTID:2298330467962157Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet and social informatization, network has become an essential factor in people’s daily life. Everything in our life is closely related to the network. Whether network is safe or not is directly related to the security of people’s privacy and property, even the national and social public security and other issues. Therefore, further study is necessary to network security and fragility, of great significance.The paper is based on complex network, and studies system risk analysis and hazard analysis simulation technologies based on complex network. According to the theoretical study made earlier, the paper designs and implements the security analysis system based on power system network topology, which can manage the network topologies, and perform vulnerability analysis and cascade crash simulation for nodes and links, and generate the corresponding security report, and provide network maintenance personnel of power system with safety guidelines.. In this paper, we have carried on the example application testing for the security analysis system based on power system network topology.The main research work of this paper is as follows:1. Studying the current status of network security and fragility research, pointing out the current main methods of network vulnerability analysis, summarizing the deficiencies of the existing research methods, and researching the network vulnerability analysis method based on the topology. 2. Studying system risk analysis and hazard analysis simulation technologies based on complex network, introducing the definition and related concepts of complex networks, macro-topology features, vulnerability analysis methods and cascading collapse analysis methods, and introducing the NS2simulation tool.3. Designing and implementing network topology security analysis system, giving the overall design and detailed design of the system, and giving concrete realization process of the system.4. Testing the network topology security analysis system with a specific network topology.
Keywords/Search Tags:complex network, security, vulnerability, cascadingcollapse
PDF Full Text Request
Related items