Font Size: a A A

Research On Detecting Technique Of Violation Network Services Based On Optimization Strategy In Large-scale Networks

Posted on:2009-09-25Degree:MasterType:Thesis
Country:ChinaCandidate:H B GuoFull Text:PDF
GTID:2178360245474825Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and network technology, many organizations have established Intranets which can promote information process, but the existence of violated network services in Intranets have brought many problems to management and security. Many kinds of detection systems are not suitable for the violated network services detected in large-scale Intranets, which leads to services missing report, and have deeply impacted on the ability of network monitoring. It is a very important to develop high efficiency and violated network services system.In this paper, we first analyzed and compared principle, application scope, merits and demerits about the active detecting technology and passive detecting technology. As to large-scale Intranets, the active detecting technology had clear advantage, so this paper's research was based on the active detecting technology.Secondly, to improve the efficiency of detecting in large-scale Intranets, we proposed a detecting strategy based on AHP and optimal search theory. We sorted all the violated network services according to the detecting priority based on survival time and harmfulness using AHP, and then sorted all the detected hosts according to detected times using optimal search theory, finally, we presented an high efficiency search strategy with the combination of these two sides. The experiments results showed that our searching strategy did some promotion for detection system in large-scale Intranets.This paper described the key technology of completing a large-scale network violated applications detection system according to the requirement, designed and complemented a violated network applications detection system, and tested the system.
Keywords/Search Tags:violated network service, active detecting technology, passive detecting technology, optimal search theory, AHP, detecting strategy
PDF Full Text Request
Related items