Font Size: a A A

Military Network Safety Protection System Design And Realization

Posted on:2010-10-27Degree:MasterType:Thesis
Country:ChinaCandidate:H Y XuFull Text:PDF
GTID:2178360302966082Subject:Software engineering
Abstract/Summary:PDF Full Text Request
To the Internet for information on behalf of the global wave and more profoundly, The application of information technology networks and the increasing popularity of wide application level is depth. With the popularization of the Internet, The openness and sharing nature of the security issues more seriously, Network vulnerability makes it vulnerable to outside attacks and sabotage, When the network increasingly large scale and more open, Their safety will then thicken and become difficult to control. Hackers can be penetrated from the rest of the world on various other locations access to the computer network and systems to steal confidential information or make destructive movements.With rapid development of computer technology and network technology in 1980s, these technologies are widely applied in military fields. Network construction has already become a very urgent and important objective to our army information and achieved positive results. With the rapidness of our army's modernization process, it's wonderful for speed of military network development , battle and office automation system has been applied widely in various applications. At present, the application systems established or being established on divisions'network include : text transmission system, information release system, videoconference system, information management system , office information system and all types of operation management systems in addition to other operation system for network self-management. Unfortunately, when military network provides convenient service to our army, all kinds of network attack means have become hidden dangers to military network, which have been threatening the safety of our army information. How to protect our military network, guard against data stolen risks, ensure military network run in good condition should be hot and difficult problems in military network construction. Consequently, our army pays more attention to the network security.Over the past five years, based on the whole condition about computer and network data stolen, the number is increasing in the military area command. The proportion of matters induced by poor management and lack of basic safety knowledge is over 50%. Facing this increasing problem of network security, only a single firewall system can not meet the safty requirement of this military area command. To meet this requirement, we put forward a scheme which introduces how to protect this military network using all kinds of techniques for security. We consider a single kind of safe system is not enough reliable in guaranteeing the safety of network information at present; it is the only means to minimize the risks to consider all kinds of aspects concerning the network safety.The thesis first introduce the research background, purpose and significance, as well as development nowadays at home and abroad; and introduce some important network security technology at present, including: cryptography on computer network, firewall technology, intrusion detection system, honey cans technology, detecting computer viruses technology and authentication technologies. We deeply discuss the information security aim, design principles and safety model, mainly discuss the design idea and principle. Then, we introduce the network safety protection model followed by most network safety systems and how to dispose software and hardware into this network. Furthermore, it has detailed the safety information supply and demand in details. Finally, we put forward the overall scheme of this military area's network security. Then the scheme is analyzed and summarized in many aspects, and we put forward a series of reasonable suggestions and strategies for the construction of this network.
Keywords/Search Tags:Network security, security analysis, network security appliance deployment
PDF Full Text Request
Related items