Font Size: a A A

The Research Of Technology About Intrusion Detection Faced To Networked Manufacture

Posted on:2007-05-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y C ChenFull Text:PDF
GTID:2132360215475994Subject:Mechanical design and theory
Abstract/Summary:PDF Full Text Request
The fast development of networked manufacturing technology bring larger integrated benefit to enterprise, at the same time, the security of networked manufacture also appears increasingly.Intrusion detection technology is absolutely necessary part of Networked security, and is most important supplement of Firewall. The Intrusion Detection System, before the attack damaging the system, detects the attack, and keeps out the attack by using the alarm-system and the defending system. In the process of the intrusion-attack, it can reduce the losing that is caused by the intrusion-attack. After the attack, it can collect correlative information about the intrusion-attack, and brings it as the knowledge of the defending system into repository, which strengthen the defending capability of the system, and which can make the system not intruded by that attack again.The text is based on the status of security of Networked manufacturing System. The text analyzed the characteristics of product data of the networked manufacture, and analyzed the technology of the hacker. In the base of which, the text put forward the strategy of making up Intrusion Detection System. The text researched deeply intrusion detection technology and correlated methods, and put forward the model of Intrusion Detection System faced to networked manufacture (the Great Depth And Grads Intrusion Detection System). The text structured the structure chart of Intrusion Detection System faced to networked manufacture and the structure chart of subsystem. The text discussed the evaluation content of Intrusion Detection System, and evaluated the capability of Intrusion Detection System faced to networked manufacture.Based on the above research production, the author designed the parted prototype system of the Intrusion Detection System faced to networked manufacture, and made Networked Manufacturing System that his laboratory study validated the prototype system. The result indicated that the Intrusion Detection System that the author exploited can protect Networked Manufacturing System to run in gear in effect, and is up to the designed requirement.
Keywords/Search Tags:network-manufacturing, characteristics of data, IDS, network security, evaluation
PDF Full Text Request
Related items