Font Size: a A A

Design And Implementation Of Security Defense System For Military Information Network

Posted on:2009-04-10Degree:MasterType:Thesis
Country:ChinaCandidate:Z D WangFull Text:PDF
GTID:2178360272976454Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the computer and the network technology develop at full speed,thenetwork information system has become an important infrastructure for a country oran army. At the same time, in the ubiquitous network, it is going the struggle to thetheft of secrets and anti-theft of secrets, destruction and anti-sabotage. Thecomputer network security problem, relates directly to domain and so on a nationalpolitics, military, economy security and stability. At present the hacker is rampant,There are every 18 seconds worlds the once hacker attack to occur in the average.Therefore, enhances to the network security important understanding, enhancementguard consciousness, the strengthened guard measure, is guaranteed theinformation industries continue the important guarantee and the prerequisite whichdevelops stably。"Safety"is a relative concept, the absolute safety is nonexistent,so we mustkeep something for a rainy day and prepare for war in peace;"Threaten"always isa development process , it is eliminated impossibly, to answer therefore only theactive defense, is effective. With very fast information ear arrival, the networksafety threatens to bulge now already and gradually austere. Answer the safethreat that this makes new , improve a network conscientiously defense an ability ,ensure duty and mission winning a network must assume as defense war, beingtroops.But especially, the troops current situation takes a look on that , the altitudekeeping secret being aware of no strong , safe protect inefficiently , systematicallocation not thinking that the network structures block of wood science waiting for the network safety problem to should arouse us, takes seriously with regard to ourcountry.This article first listed abroad in recent years, our country and our military havebeen a number of attacks to undermine the incident to illustrate the importance ofthe defensive network of networks, and through April 26, 1999 CIH virus outbreak,the U.S. military with the loss of our military To illustrate the disparity between ourmilitary to strengthen defense network of urgency. The computer network is thatthe computer referring to geographical feature appear on the stage of disperse manybeing independent passes the soft, hardware equipment interconnection, to realizeresource share and information exchanged system. The computer network is thatcommunication son net and resource son cover two major part as with a net mark ,the interconnection , any platform computer in network can use procedure , data andhardware equipment in network without exception by network equipment and thenetwork agreement.The second chapter briefly introduced the concept of computer networks,computer networks and the development of basic knowledge of networksecurity,and introduction and analysis of network security and the currentdevelopments. Threat having introduced that the network safety studies backgroundand the network safety are latent then and insecure factor that the network thereexists in middle. Share nature and interconnection degree expansion with networkopening to the outside world,turn up that Internet covers as with a net especially,network significance and the effect to society are also more and more big. Be on therise with the fact that the network mounts new various business's, being on the risesupposing that Electronic Commerce (Electronic Commerce), electron by cash(Electronic Cash), figure currency (Digital Cash) , cyberbank (Network Bank) waits,various special use net (suppose that the finance net waits) construction and, thewill do safe problem looks like growing in importance, a hot spot having become thecomputer now and the boundary communicating by letter therefore to safe go into ofnetwork. What computer network frontage threatens cardinal principle but is two kinds mark: Be hit by the information threat first to the network; Two is the threat tonetwork middle equipment. Factor affecting a computer network's many, somefactors may do it deliberately, also possibly be accidentally; May be artificial,possibility dispute is also artificial; Also being in the cards is that outside hackerillegalness to network system resource is put into use. The at last has set forth ourcountry network safety developing the restraint factor.The third chapter introduced the army's computer network developmentprocess, pointing out that at present there are users who have low level awarenessin military computer security ,computer security management and anti-virustechnology . our military faces threats to hidden problems of devices, networkcommunication software, the hacker attacks and other problems. Equipment hiddentrouble includes electromagnetism leakage , medium remanence effect and inadvance be placed in trap. The process communicating by letter snaking in thegrass being to point to the realization in network agreement is hit by a network,because accidentally negligence and deliberately have arranged many safe leak for ,have left. Software hidden trouble is to refer to the loophole in designing that timethere exists many in inevitable field not improving and perfecting or powder findsthat. The vulnerability being self mainly make use of computer information networksystem invades a hacker network, whose main means has system to steal thepassword and the password , illegally enters; Make use of network system softwarefunction, loading "spy" procedure; Pass entrance convenient and rapid , the turn intosystem inside; Hidden trouble includes safety other keeping secret being aware ofthe leak light and to have managed existence.Chapter IV introduced the design of the network security defense system. Firstof all, the defense system needs to guarantee the security system (the client security,server, data security, data transmission network security) and the work of theinternal network security platform. Secondly,it analysed the Loopholes in thesystem,possible attackers and attack purpose,the attacker could use the tool toattack and attack sites, the attack could lead to the consequences of its own network of users of the security risk. According to the analysis of the design, includingphysical protection, network protection and data protection defense system. Designthat system protects including physics , network protection and the data protect. Themajor objective that the network protects is isolation , detecting and attestation. Thedata protects including moving data administration, OS safety and transferring anencrypt.Chapter V of a military sub-district, for example, give full consideration to thehuman, material and financial resources,.on the basis of the existing network, thefirewall to load and video-jamming hardware to install anti-virus software, securitysoftware systems, such as transmission systems and building A set of detection,isolation, authentication, anti-virus functions such as security defense system, toachieve better protection of the military information network security. Physicsprotection comes true including that the military PC of loading armed force KAJ-IIvideo frequency relevance disturbing an implement , works out strict perfectmanagement system , builds data back-up system. Loading omen star enterpriselevel fire prevention wall RFW-100 realizes the function keeping apart, assembleJUMP on realization protecting in network, invade detecting system realizationchecks a function,loading SRZ06 dignity attestation system realizes attestation. Onrealization protecting in data, install the computer and going through a secret carrierprotection keeping secret managing system realization moving a data, the methodadopting to put a patch and to assemble the omen star killing the poisonoussoftware comes to guarantee OS safety , system realization transfers an encrypt byassembling a bodyguard knowing the culture electricity transmission.The deficiency appearing has carried out the process final , designing thatand coming true to system analysing. The scheme designs that risk analysesinsufficient precise face to face in process first, two be our country large amount ofhardware , software product core grasp in others's hand, three are troops networkconstruction and manage middle having many problem. How much better composing the information network protects final military affairs kind with havingbeen in progress looking into the distance.
Keywords/Search Tags:Military network, Network Security, Defense system
PDF Full Text Request
Related items