Font Size: a A A

The Research On Vulnerability Analysis Of IP Network And Strategies Of Safe Control

Posted on:2006-10-07Degree:MasterType:Thesis
Country:ChinaCandidate:X J HeFull Text:PDF
GTID:2168360152475061Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, the computer network develops fast, the following security question is outstanding day by day too. Security of network relative, but network absolute. How to guarantee that the privately owned information on the network is not stolen or destroyed and already become a problem badly in need of solution. This thesis has carried on more overall argumentation to the online security question of the computer at first, have analyzed main threat and main form threatened in which the computer network faces at present, point out that the network system, especially existence of vulnerability in IP network are the origin with unsafe network system; Then the vulnerability existing to network itself of IP, security loophole and vulnerability and typical attack to IP network vulnerability that the software agreement exists are analyzed and studied, have drawn IP network vulnerability analytical method; Is it carry on research from IP angle that network control safely to fire wall technology, encryption, authentication technology, etc. control technology of online security to focus on, and concrete to analyze and study IP vulnerability scanning and detection technique of network to IP vulnerability and security inherent characteristic of loophole of network, have put forward the vulnerability method of measuring in the measuring technical research of vulnerability, and prove under the environment of experiment; Must publish IP network vulnerability controlling mechanism, tactics, model and solution based on detection technique finally, have introduced the autonomy agent's system and carried on the detailed design and realized partly in measuring. Have studied the vulnerability of the network and security countermeasure of vulnerability and established the foundation further for the online security respect.
Keywords/Search Tags:Computer network, Security of network, Vulnerability of the network, Control strategy
PDF Full Text Request
Related items