Font Size: a A A

Studies On The Distributed Dynamic Defense Technology

Posted on:2008-07-10Degree:MasterType:Thesis
Country:ChinaCandidate:L H YuanFull Text:PDF
GTID:2178360215451585Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer sciences and information technology, network security has become a vital issue in relation to every aspect from individual life to national policy. Consequently, various technologies like intrusion-detecting system, hole-scanning system have been generated in order to prevent secure problems such as network attacks, viruses and so on. However, with the emergence of multi-attacks, diverse sources of attack, and etc., it is becoming not easy for those secure technologies, one of which can only solve one kind of problems, to meet the varying needs of secure defenses because they have the limitations like mono-function and isolated management.Based on the analyses of the limitations of existing secure technologies and the ideology of dynamic secure defenses, this paper proposes a multi-system-interacting security-defending model with the integration of intrusion detection, access control and etc., which makes switcher and intrusion detection interact. The model, through the co-operation of diverse secure technologies, not only improves the self-adapting abilities of system, but also promotes the accuracy, flexibility and timing of network security-defending system, which eventually reaches the automation of secure network defenses. The main content of this paper comes as follows:1. to reach the consolidated management of secure facilities, which supports the co-operation of diverse secure facilities;2. to implement the unified defining measures and expressive ways of secure information exchanges, which makes diverse secure products exchange information in a unified framework;3. to accomplish the design of tactic system;4. to finish designing a dynamic reactive multi-system model;5. to achieve the interaction of switcher and intrusion detection.
Keywords/Search Tags:network security, intrusion detection, interaction
PDF Full Text Request
Related items