Font Size: a A A

Based On Intrusion Detective Technology Campus Network Security Model

Posted on:2007-06-23Degree:MasterType:Thesis
Country:ChinaCandidate:M X Z DuanFull Text:PDF
GTID:2178360185992549Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In view of multitudinous invasion behavior, in order to strengthen our network the security, people studies formulates and applies each kind of security strategy and tool tradition defense strategy is: Uses like static safe defense strategy and so on the firewall, encryption, status authentication as well as visit control, operating system reinforcement. This kind of defense measure played the very good role in the certain degree. However, along with the invasion technology unceasing development, the attack method and the method day by day complication and the diversification, this kind passive, the static safe defense system already was unable to satisfy the current security condition the need. Under this kind of situation, urged the invasion examination system birth, it was by the driving way through the inspection network and the system interior data unusual situation discovers possibly existed the invasion behavior, and carried on reports to the police or shuts off on own initiative invades the channel. The invasion examination has the surveillance analysis user and the system behavior, the audit system disposition and the loophole, the appraisal sensitive system sum accumulator according to complete, the recognition attack behavior, carries on the statistics to the unusual behavior, automatically the collection and the system correlation patch, carries on the audit track recognition violates the safety rule the behavior, the use traps function and so on server record hacker behavior, enables the system manager to be allowed effectively to monitor, the audit, to appraise oneself the system. Invasion examination system, not only may prevent from to the exterior attack, but also may discover the internal personnel's tort, made up other static defensive systems insufficiencies.The invasion examination system (IDS) the full title is Intrusion Detective System, it from the computer network system certain key point collection information, and analyzes these information, in the inspection network whether has violates the security strategy the behavior and encounters the attack the...
Keywords/Search Tags:Network Security, Intrusion Detection, Intrusion Detection System(IDS), Network Security Model
PDF Full Text Request
Related items