Font Size: a A A

The Research And Implementation Of The Network Attacking And Defence Platform (NADP)

Posted on:2009-08-18Degree:MasterType:Thesis
Country:ChinaCandidate:Y C LiFull Text:PDF
GTID:2178360278457127Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the network technology and the increasing frequency of the malicious attack events, more attentions are put in the domain of the network security. To protect the network from the malicious attack and enhance the anti-attack capability of the network security administrators, based on the research of the network security technology, this paper design and implement a Win-32 based network attack-and-defense platform (NADP).Easy to monitor, easy to maintenance is the foundation of an excellent attack-and-defense platform, the deep understanding about the network attack-and-defense principle is the crux of the design and implement an attack-and-defense platform. This paper first consults some existed documents and tools, researches the network security technology and analyzes the common used network attack and defense technology's principles.Based on the above principles, the main contributions of this paper are as following things.(1) Based on the current situation of the network security, we propose a model of Win-32 based attack-and-defense platform. We divide the platform to modules and define the function of each module.(2) Design the virtual network devices and deploy of the Win-32 based honeynet network, implement the network attack module and defense module by integrating some existed software and tools. The final platform can fulfill the requirement of the initial design.(3) Illustrate the usage method and validate the effectiveness of network attack-and-defense platform by an integrated simulation attack.Nowadays, the training of network attack-and-defense and the related platform are more and more concerned. The platform we design and implement in this paper is wished to fill the gap between the researches and the applications by its user-friendly and easy-to-deploy characteristics.
Keywords/Search Tags:Network Securtiy, honeynet, Intrusion Detection, Attack, Defence
PDF Full Text Request
Related items