Font Size: a A A

A Study For The Security Of Computer Network Based On Attack And Anti-attack Of Radiated Virus

Posted on:2008-05-08Degree:MasterType:Thesis
Country:ChinaCandidate:C JieFull Text:PDF
GTID:2178360212974475Subject:Measurement technology and equipment
Abstract/Summary:PDF Full Text Request
With the development of the science technology, the computer network has been applied to many fields, such as public apartment, military apartment, commercial apartment and so on. At the same time, the security of computer network is more important. With the virus weapon appearing, the study for the techniques of attack and anti-attack of signal radiated from a computer network is significant to information security.Aiming at the problem of information safety of the computer network, this paper give a model to attack and anti-attack of virus and signal of processing flow. Base on this, the spread of virus and radius of defence are given.At the beginning, this paper points out the technology of radiant virus'injection and mathematical mode. In the following, this paper analyses the computer network's communication protocol. We finally analyze the programme of computer virus in the frequency domains and some common files and get dome useful conclusion.Based on the theory of field-line coupling, in the four sections, we design the model of the field-line coupling , at last we analyze the critical voltage of the computer network and the radiation field of the broadcastion station. Finally we get the power which is used to realize the technology of virus countermine. Moreover, supposing the carrier were broadcasting stations, the threshold voltage of virus infection into a network was studied.The technology the safe radius for a network and identifying is discussed in chapter fifth. After analyzing field-line coupling and the wired propagation of virus coupling signal was determined ,based on the model of conductor transmissing, the rule of determining the safe radius for a network was brought forward. Then we get the identify method of virus information through probabilistic method .
Keywords/Search Tags:Anti-signal-leaking, Computer virus attack, Coupling and injection by radiation, Radius of defence
PDF Full Text Request
Related items