Font Size: a A A

The Intrusion Detection System Design And Deployment Research For DCN Of Service Providers

Posted on:2011-09-28Degree:MasterType:Thesis
Country:ChinaCandidate:W DaiFull Text:PDF
GTID:2178360308462403Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Today, the rapid evolving internet introduces a series of security issues. Due to this reason, intrusion detection became the critical point in the internet security research area.In the first part of this articleâ… focus on internet security's status and issues. Followed by pointing out the limitation of firewalls, based on this I provide insights on a new network security model:the APPDRR model, and describe the purpose and significance of Intrusion Detection System in details. Then I explain what intrusion detection is based on its modes, theories and techniques, and discuss its structure, functions classification, methods and comparisons. Furthermore I highlight the insufficiency of intrusion detection and its future development trend.In the second part, by studying an application of IDS based on the example of a domestic service provider's deployment of IDS in its backbone network, I firstly analyze the current network status of this service provider. Then I aim at the network construction schemes after a detailed analyzing of IDS's structure, deployment status, construction principles and strategies; and compare the plans to bring out the requirement of equipments. Afterwards, make out the evaluation of the corporation economy based on the design items. Firstly, introduce the basic principles for economy evaluation, analyses the indirect benefit founded on basic principles, discusses how the enterprise incarnates benefit on cost saving, work efficiency improving, selling and decision-making by items, then makes out evaluation on civil economy.At last, it sets forth effects that the Intrusion Detection System brings for enterprise on administration, operation managing and so the others. faces so many problems such as how to confirm the investment worth, evaluate the profit size, analyze the uncertain factors, decide the investment callback time, therefore this project must have high risk. We should evade risk effectively and give suggestions based on security venture analyse. Also in this article, it discusses how to manage, control risk, and transform it into necessary condition for success. Simultaneously, as an important research field of network safety, intrusion detection technology still has many problems and technology difficulties. In the end, it summarizes the research work, indicates what to do next.
Keywords/Search Tags:network security, computer network, intrusion detection, network application, economy evaluation, risk administration
PDF Full Text Request
Related items