Font Size: a A A

Study On Linkage Defense Technology Of Network Defense

Posted on:2009-05-29Degree:MasterType:Thesis
Country:ChinaCandidate:J Y HeFull Text:PDF
GTID:2178360272473413Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the development of computer and network technologies, information technologies are widely applied in the military field. The computer-centric modern information network has become the nerve of the military system, its performance merits and conditions have a direct influence upon the combat effectiveness of the armed forces. Computer network countermeasures acted as a new means of warfare will play more and more important role in future war. So it is very important to study the technologies of network defense.The technologies of computer network defense are developed quickly, which involves a lot of some other domain. In this paper, we mainly study architecture of network defense system based on firewall and intrusion detection. An intrusion detection system will be designed and implemented to meet a factual demand. The main research works in this paper are shown as:⑴Some main network attack technologies are systematically introduced.⑵We introduce and analyze the main network defense technologies, such as: Firewall, intrusion detection, authentication and cryptology, honey pot and honey net, and so on.⑶After the advantages and disadvantages of intrusion detection technique and firewall technique are analyzed, to overcome shortcoming of single technique, we propose a security defense system which is combined firewall with IDS. The implement of architecture and main function modules, such as data filtering and data distribution, processing of network data, system monitoring and blocking, center processing unit are discussed in detail.⑷According to actual requirement, we design and implement a intrusion detection system, witch contains data collection module, data analysis module, data management module.
Keywords/Search Tags:Network Defense, Firewall, Invasion Detection, Linkage Technology
PDF Full Text Request
Related items