Font Size: a A A

The Research On Integated System Of Content Security In Communication Network

Posted on:2007-06-24Degree:DoctorType:Dissertation
Country:ChinaCandidate:W ChenFull Text:PDF
GTID:1118360185467808Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the fast development of Internet, network has become an important information carrier in the global range and one of the main channels to propagate information, Internet has become a massive, heterogeneous, non-structural information center, and an indispensable part of living. At the same time, information in network has present much characteristics such as great quantity and variety, omnifarious contents and growing rapidly.The development of Internet bring everyone and enterprise with not only great convenience but also increasingly deteriorating problem of network information security, such as the destruction of the virus, network intrusion and secret leak-out, spam, the content spread through Internet in counter-government, pornography, violence which are increasingly impendent to resolve. At the same time, the needing of network content monitoring is increasing. Facing to these, some security fields, which are correlation with applications, are developed beyond the traditional Cryptology, such as anti-virus technique, anti-spam technique, network intrusion detection, stegano detection, network content monitoring technique. Although the trait of related content or operation pattern are diverse among all technique mentioned above, they are depend on key techniques of trait identify and fast match.Once, these application security fields developed separately. With the 'integration' of attack methods, such separate network security systems Exposed more security weakness day by day. Protection needing cannot be satisfied by Invasion detection and firewall techniques, which cannot prevent programs or files infected from transport. Although normal antivirus software based on host has become very mature, missing is unavoidable for updating in every computer, the result of which maybe...
Keywords/Search Tags:Structural Trait Model, ComplEx Trait Scan & Search Engine, Stegano Detection, Cryptanalysis, Protocol Analysis, Content Security
PDF Full Text Request
Related items