Font Size: a A A

Research And Application Of Intrusion-tolerance Technology In The Network Security Of Power Enterprise

Posted on:2008-11-11Degree:MasterType:Thesis
Country:ChinaCandidate:L F XuFull Text:PDF
GTID:2178360212480800Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the improvement of the computer network and automatic level of electric network, the dependence on information system of electric enterprise is stronger, the security problem faced at the same time is greater. At present, it is far from enough to rely on the traditional safe practice to maintain the system safe while the attack means change rapidly. Directing against the characteristic of the electric enterprise's information network, intrusion-tolerance technology is used to protecte information system in this paper. At first, this paper studies the structure and security situation of electric enterprise's information network, then introduces the basic theory of intrusion tolerance. After that, we study the key technology of intrusion tolerance: set up a distributed intrusion detection system model based on mobile agent; study the object replication technology and improve the voting algorithm; analyze and research the elliptic curve encryption system. Finally, on the basis of studying service and data in power system, we propose solutions to protect service and data from intrusion respectively.
Keywords/Search Tags:network security, intrusion tolerance, intrusion detection, voting algorithm, elliptic curve encryption system
PDF Full Text Request
Related items