Font Size: a A A

Military Network Security Model Analysis Based On Intrusion Detection Technology

Posted on:2009-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:X F WangFull Text:PDF
GTID:2178360272479625Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the fast developing of military information, the securities of military network are concerned more and more. Because the military information is serving for fight, most of detecting information and fighting orders are transforming in the military network.Therefore, it is forbidden to interrupt the communication in the military network during the war. In view of multitudinous invasion behaviors, in order to strengthen military network safety, traditional defense strategy is: uses like static safe defense strategies, such as the firewall, encryption, identity authentication as well as visit control, operating system inforcement and so on , are adopted. This kind of defense measure played the very good role in the certain degree. However, along with the invasion technology unceasing development, the attack method and the method day by day complication and the diversification, this kind passive, the static safe defense system already was unable to satisfy the current security condition the need. Under this kind of situation, urged the invasion examination system birth, it was by the driving way through the inspection network and the system interior data unusual situation discovers possibly existed the invasion behavior, and carried on reports to the police or shuts off on own initiative invades the channel.This thesis analyzed deeply the unsafe factors and reasons caused in military network by researching and contrasting military network with public network. At the meanwhile, this thesis analyzes the way and methods of destroying and invading from enemy. According to the research mentioned above, thesis does reaserch on two aspects to prevent military from enemy's invasion and destroy. one aspect is to improve the struck model of current military network through analyzes the way and methods of destroying and invading. Another aspect is to improve the securities by detecting technology, analyzes deeply the law of DoS attack, this thesis does the research on the law of IDS, points out its weekness and the reasons that it is not used in military network,put forward a model that fit for IDS in the military network by improving the current IDS .
Keywords/Search Tags:Information, Safety, Military network, IDS, DoS
PDF Full Text Request
Related items