Font Size: a A A

The Research And Design Of Detection Model Of Information Security Based On Simulated Attack Method

Posted on:2012-10-16Degree:MasterType:Thesis
Country:ChinaCandidate:J LiuFull Text:PDF
GTID:2178330332493758Subject:Education Technology
Abstract/Summary:PDF Full Text Request
Represented in the Internet global information network of the rapid development information security is increasingly become the focus of attention,and become one of the important issues of the information development. Study of information security including information security equipment and other hardware product development, safety testing technology and information security technology, and the development of security software which deployed in hardware devices and a variety of information security technology.As an important aspect of information security technology, information security detection technology for the maintenance of system stability and security system security is of great significance. Information security detection technology research's goal is to achieve real-time, accuracy, comprehensiveness of the detection. Studies carried out around this goal, including detection technology which based on vulnerability database and abnormal behavior.and detection technology which based on host-based and network-based. The detection technology promotes the development of information security, but also there are some deficiencies. That is, among the real-time, accuracy and comprehensiveness.often requires trade-offs, resulting in a lack of performance.This paper focus on the systemic point of information security. It is analyzed to explore the information security technology which the study of the detection model of information security involved in. To the safety testing for the current information systems in a number of shortcomings, a detection model of information system security which based on simulated attack detection method is proposed, and it carried out a detailed analysis, research, design to the overall model and individual modules.Finally, the model was tested to prove the results of this model test. The model system for the standing system perspective of information security has a certain reference value.
Keywords/Search Tags:simulated attacks, detection methods, information systems, security, model
PDF Full Text Request
Related items