Font Size: a A A

Research On Attack Severity Evaluation Techniques Based On Host

Posted on:2006-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y W GongFull Text:PDF
GTID:2178360182460507Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the fast development of information process and internet network, network information security has become an important part of national security and be widely studied in information domain. At present, network security techniques comprise firewall techniques, intrusion detection techniques, encryption techniques, access control techniques and VPN techniques etc, they are used to strengthen network security in different aspects. Although Leak Scan techniques, anti-attack test techniques, security assessment techniques are not used to strengthen network security directly, they can be used to test a system security grade.This paper lays a strong emphasis on detecting and evaluating attack severity, after analyzing real damage of a system which the familiar attacks made and evaluating attack severity, it can offer data to system security assessment system. Firstly, it elaborates on the attack steps, approaches and results, On the basis of this, it presents a definition of attack severity and discusses the meaning of researching attack severity.Secondly, aim at attack severity and evaluation, this paper narrate many techniques about attack severity detection. After analyzing the collected system data, it presents a set of system real damage analyse rules and approaches based on log information analysis. After researching theory of fuzzy math, this paper also designs an evaluation model of attack severity based on fuzzy math.Finally, a prototype based on severity detect and evaluation of host system is designed.Most of function modules are implemented in this project.
Keywords/Search Tags:network security, attack detect, severity, fuzzy comprehensive evaluation
PDF Full Text Request
Related items