Font Size: a A A

The Architecture And Application Research Of Intrusion Deception In Military C~4Ⅰ Network

Posted on:2008-05-09Degree:MasterType:Thesis
Country:ChinaCandidate:J B ChaoFull Text:PDF
GTID:2178360242973225Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
As the nerve center of modern army, Military C~4I Network counterwork is attached important by government and army in the world day by day. So it has the great military meaning for us to do C~4I Network secure defence well. As a network secure active defensive technology, intrusion deception can redirect the known attack from key system and node to honeypot to protect them. It has a widely application and military value in Military C~4I Network secure defence.Firstly, the article analyses the threat and solved measure of C~4I Network secure from its building and secure actuality. According to that, the importance of intrusion deception in C~4I Network secure is demonstrated. Secondly, according to the study of intrusion deception signification and technology, the architecture of intrusion deception in Military C~4I Network is given with the analysis method and signification of C~4I Network secure architecture. At the same time, the system model of intrusion deception in Military C~4I Network is also advised.Finally, in the base of the architecture of intrusion deception system, the virtual intrusion deception system is realized with the popular tools and software in the world. In the end, the system is simulated and tested.
Keywords/Search Tags:C~4I Network secure, Intrusion deception technology, Intrusion redirection, Honeypot, Virtual technology
PDF Full Text Request
Related items