Font Size: a A A

The Research And Implementation Of Military Networksecurities In Building Military Information

Posted on:2007-07-07Degree:MasterType:Thesis
Country:ChinaCandidate:C B LvFull Text:PDF
GTID:2178360185974682Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the fast developing of military information,the securities of military network are concerned more and more.The paper analyzes some unsafe factors existing in the military network and studies the possible ways of enemy take to invade and destroy the working of military network.. what is more, the paper focus on the studying of DOS attack in the military network and finished the simulation in the virtual military network..Because the military information is serving for fight, most of detecting information and fighting orders are transforming in the military network..Therefore, it is forbidden to interrupt the communication in the military during the war. One the one hand,because the military network is a private network, it improved the securities of military network to some extent.On the other hand, the military network has some other security problems because of the separation of every military places. One of these problems that physical linking circuit and access point have some unsafe factors may expose the access to the military network and then destroy the whole military network .Therefore, in order to protect the life of arms in the battle and secure the victory of war,It is very necessary to research the securities of military network.. the paper analyzed deeply the unsafe factors and reasons caused in military network by researching and contrasting military network with public network. At the meanwhile, the paper analyzes the way and methods of destroying and invading from enemy. According to the research mentioned above, paper does reaserch on two aspects to prevent military from enemy's invasion and destroy. one aspect is to improve the struck model of current military network. Another aspect is to improve the securities by detecting technology.The paper not only analyzes deeply the law of DOS attack. But also implements the DOS attack in the simulated military network environment which give supports to detection and research.Finally, the paper does the research on the law of IDS, points out its weekness and the reasons that it is not used in military network.The paper put forward a model that fit for IDS in the military network by improving the current IDS and implement the system by programming on Linux.The Main three aspects in paper as follows:(1) the unsafe fators and enemy possible invasion method in current military network. And solving these problems by improving the structure of military network.
Keywords/Search Tags:Military network, IDS, DOS
PDF Full Text Request
Related items