Font Size: a A A

Based On Bypass Technology Core Level Network Virus Containment System Design And Development

Posted on:2008-06-18Degree:MasterType:Thesis
Country:ChinaCandidate:J P DengFull Text:PDF
GTID:2178360248452208Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The diverse propagation way and complex application conditions bring network virus eruption in frequency, latency and overcast, therefore the network virus do very serious crisis to the Internet. Traditional anti-virus technology confined to the single virus searches, killing, and the creation of personal firewall, belongs to "passively" the control technique , can not satisfy the network virus prevention completely the request and contains the large-scale network virus spread effectively.Aiming to establish the real-time of detection and defense network virus containment system, this article applies the bypass technology to establish based on the core switch. The paper has analyzed the dissemination model which and the dissemination strategy, the technology the network virus uses as well as takes the countermeasure the viral containment technology , especially has conducted the thorough research and the analysis to the network virus automatic detection technology and the network virus containment system's construction method . This dissertation based on misuses the examination with the automatic detection technology which exceptionally examines unifies. It can promptly discover in the network current capacity unusual and points out the unusual current capacity the nature and building the system on the core switch to control for large-scale network virusThis system designed on base this work principle: according to the complex network environment and the different host information, different network virus detection components can be adopted and different host-recovering components can be created. In the proposed system, the host-recovering components can be created at an exponential rate while the epidemic situation is breaking out, which can be used to recover the hosts infected with network virus in parallel. Furthermore, the state-checking and the policy of authentication mechanism ensure the security of the components.
Keywords/Search Tags:Automatic detection, Network Virus Block, Active Control
PDF Full Text Request
Related items