Font Size: a A A

Study On Computer Network Security Architecture Of Army

Posted on:2007-06-18Degree:MasterType:Thesis
Country:ChinaCandidate:S H HuangFull Text:PDF
GTID:2178360185474482Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Currently, with the military's informationization rapid development, the problem of information network security is increasing evidently. So it is necessary to construct rapidly a system of the information network security whose technique is advanced, management is high effective, peacetime and wartime can be combined, and which is secure and reliable. The military's informationization in the world nowadays has indicated that the higher the informationization level of a military has, the more dependent on the network system it is, and the more evident the problem of security of information network is. Only building a security and effective the network system can really exert present its benefit on military affairs. Aiming at the disadvantages of the military computer information network security system and the standard carrying into execution in existence, this dissertation studies with the technique of gradation, hierarchy, defense in dynamic and depth, honey-pot architecture, network cheat and so on. The main contents of research are described as following:1) Lucubrating the main security problems which the military computer network faces nowadays and in the future. And basing on four ways of the computer network confrontations on the levels of substantiality, energy, information (logic) and apperceive, discussing the relevant countermeasures which the computer network defense should take when the military computer network aims at the confrontations of different levels.2) Bringing forward the whole security defense tactics of the military computer network. Delaminating expatiates about the information network security tactics by basing on the three ways of human, technology and behavior.3) Adopting the idea of depth defense system framework, expands the three-dimension security system architecture, DGSA of DISSP and P2DR security system model, bringing forward the Defense-in-Dynamic and Depth architecture.4) Analyzing honey-pot and honey-network system, and researching on application of the honey-pot in the intrusion detection and the response in the military computer network.5) Analyzing the ideas which are based on the session re-directive and"Man-in-The-Middle"attack, and the catch to the unknown attacks. Base on it, designing and realizing the honey-pot and honey-farm system which are distributed session redirection.The security system and network cheat brought forward by this dissertation have been...
Keywords/Search Tags:Security Architecture, Intrusion Detection, Defense-in-Dynamic & Depth, Honeypot System, Unknown Attack, Network Cheat
PDF Full Text Request
Related items