Font Size: a A A

Application Research On Network And Information Security Using Mobile Agent

Posted on:2006-03-30Degree:MasterType:Thesis
Country:ChinaCandidate:J F LuoFull Text:PDF
GTID:2178360182470000Subject:Systems Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and network technology, the global communications with widespread open net environments have become the dominant trend in the future. There are inevitably some potential security problems while the Internet is providing open or share resources. Therefore, security problems of network become a focus of attention and research. The application of Agent and Mobile Agent will greatly improve the method of development of computer software. The technology of Mobile Agent can support distributed management in capability and has a wide foreground in network security technology. The author puts forward a mobile agent system scheme combining with the system of security log audit, which has a good strategy of route and mistake permissibility and can solve the implementation of mobile agent effectively in complex and heterogeneous network. This dissert discusses the traditional technology of network security in detail and puts forward the technology of mobile agent. Furthermore, it analyzes the feasibility and advantage of mobile agent in the field of network and information security. Finally, the author discusses the mobile agent prototype using in the security log audit and collection. The author introduces a solution with the "star-topology"architecture, exemplifying the mobile agent-based log audit security system, which is valuable both in practice and theory. The prototype provides a referable solution for the implement of similar mobile agent system.
Keywords/Search Tags:Mobile Agent, Network Security, Log Audit, Architecture
PDF Full Text Request
Related items