Font Size: a A A

Research For P~2DR Model Based On Police Network And Its Application

Posted on:2006-11-29Degree:MasterType:Thesis
Country:ChinaCandidate:D S WanFull Text:PDF
GTID:2168360152987058Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information computerizing for the police network, all kinds of confidential information exist in it. With police network security technique, the method to deal with network attack is to adopt passive defense means. All these means seem too less able to handle swiftly changing attack methods. In order to Protect the police network system proactively, How to make the police network security defense system dynamic and change the measure actively but not passively are the task of network security research.The aim of this thesis is to discuss P2DR security model and Honeypot, It integrate the current network security technologies. And application the same strategy database as a core, it can also dynamically and adaptively adjust network security strategy and rules. Joined the Honeypot into P2DR security model, can improve the capability of P2DR security model.This thesis consists of three parts:Firstly, the thesis introduces the character of the police network. Security events of police network and its reason, presents the research background and contents. The thesis gives an attack taxonomy based on the P2DR.Secondly, To solve this problem, the thorough analysis has been done to understand the P2DR Model including its timing attributes and it concludes that the IDS can be grouped into three different types: detection before intrude, detection intruding, detection after intrude Applying Honeypot technology to the P2DR Model will improve the detection ability of the P2DR Model. This is what I have done for this project. In short, when the firewall and IDS realize there is a new type of suspect invasion behavior, the P2DR Model will direct intrusion connection into Honeypot, monitor its invasion behavior, generate rules, and add the rules to the database of the P2DR Model.Finally, by applying the improved P2DR Model, I have eventually established an application plan for a dynamic police network security model.According to the conclusion of this thesis, we can claim that honey pot can improve the capability of P2DR security model.
Keywords/Search Tags:P~2DR, Honeypot, Timing attributes, IDS, Firewall
PDF Full Text Request
Related items