Font Size: a A A

Studying Of One Division's Military Training Network Securing

Posted on:2010-04-13Degree:MasterType:Thesis
Country:ChinaCandidate:W YangFull Text:PDF
GTID:2178360302966106Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along with information age arrival, our army informationization construction rapid development. The computer network while increases the battle efficiency for our army, also has certain security hidden danger.The technical development and the computer network widespread application, causes the computer virus more and more to be in flood, is ubiquitous the network hacker attack, causes the military network to come under the attack to be more and more serious. Various armies' military network generally lacks the independent computer network software and hardware core technologies. Besides the higher authority allocates, the main software and hardware basic all is through the tender way from the market purchase, the equipment, the operating system core part all is by the overseas manufacture development, has the massive security hidden danger.Therefore, our army strengthens the army computer network the information security and the protection already urgent, constructs a security, the highly effective military network system, since army informationization development objective request, also is prepares for wins the urgent need.The present paper first the security risk which exists to the army some infantry division military training network carries on the analysis.This military training network the main question which mainly faces in the use first is the network maintenance management difficulty enlarge, the military training is moving towards the intensification, the network gradually, officers' and soldiers' online training time increases, trains the net dispersal area broad, the function many, the question breakdown localization is complex, the network security not high, the maintenance management difficulty is big; Next network resources mix the difficulty enlarge, along with application thorough and to information level of dependency increase, how reasonably effectively to trains the net band width the dispatch and the assignment, satisfies on various units online military training and the long-distance synchronized network the conference, application questions and so on message transmission becomes an important question which current urgently awaits to be solved; Third is the network security operation question difficulty enlarge, as a result of questions and so on user quality, network management, trains the net when the use, existence user authentication, authorized management loose and so on questions, easy to create divulges a secret with the attack.In addition, trains the net information data transmission capacity to be big, the current capacity resources take many, easy, system collapse questions and so on to create the current capacity jamming, to die machine, these questions will occur any time all can create the serious consequence to the entire network movement. Trains the risk which the net exists to synthesize mainly has the physical risk, the network risk, the viral risk and the management risk. These question existence already caused this network maintenance department and officer's special attention, according to officer's request, unified the new turn army informationization construction, this teacher set up the teacher military training network network security management group, aimed at specially trains the security problem which the net existed to conduct the earnest research, the security risk which the union training network existed proposes the concrete solution. Regarding the physical risk, the use the red shield; the network shielding system carries on the physical protection; Regarding the network risk, uses the ring-like structure to replace the linear structure increase to train the net the security, uses the VLAN technical support network security and the use encryption technical support network correspondence security; Regarding the viral risk, uses the auspicious star company the multi-system center solution to carry on the viral protection; Simultaneously adopts the strict realization system, the enhancement duty overhaul, the strict security watch, the enhancement fords means and so on dense carrier management to carry on the guard to the management risk.In order to strengthen the independency which the training network protects, in under the higher authority hub expert's instruction, the teacher military training network safety control group has developed the red star the safety system. The shielding systems mainly has safe functions and so on protection, network control, safe audit. In view of trained the security loophole which the net existed, this article emphatically studies the shielding systems port scanning module, the module has been possible to discover the FTP file transfer, the DDOS attack and the firewall and so on the security loophole. The port scanning module does is the red star a network security shielding systems constituent, in trained on the net to carry on the utilization.。Looked through the use result that, the module can discover on the server target machine the security loophole, like the RPC loophole, the DDOS loophole, the SMTP loophole and so on, have achieved the anticipated goal basically. Because the time is hasty, the module existence database is not very perfect, leaks the storage cavern quantity extremely few questions, waits for strengthens the improvement in the further use.
Keywords/Search Tags:Military, Information, Networking, Security protection
PDF Full Text Request
Related items