Font Size: a A A

The Network Safety And Solution Of Intelligence Network

Posted on:2011-10-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2178360308961430Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
The intelligence network is developed by modern telecommu-nications operators to meet market demands and make up the limited and inflexible functions of the exchange. The intelligence network adopts the logical processing of concentrated services and the means of concentration database system to accelerate the providing of new telecommunications business.Most intelligence networks contain their own charge system and business logic. The structure of the intelligence network is mainly composed of servers, firewalls and routers. For the sake of convenient use for customers, some services will be provided through the Internet. At present, a number of companies are dedicated to the development of intelligence networks, though with different technological levels. In terms of IN configuration, safety is an important consideration. Basing on IN network safety refers to that the realization of modern new telecommunications services is based on data security such as server system, database, and WEB. In the daily maintenance of intelligence network, in addition to a lot of breakdowns on the business, there are attacks from the Internet. Hackers would generally search for targets through the network with the commonly used tool "ping". They would use special tools such as "fping" to scan a network segment. As soon as they find the target, they would check the target hosts, including flag grabbing, operating system scanning, port scanning, etc., for the latent loopholes of target host. For instance, if they have made clear the operating system, they would attack the host through some loopholes of the operating system, discover the running services, and find out an attack point, such as some IIS services. Then they would launch remote attacks, and obtain the interactive access control rights, such as writing malice code in the parameter. Some service with such loopholes will send out an interactive shell to the destination address according to the malice code. Acquiring the interactive access rights enables a local attack. Then the hackers would guess the password. Local buffer area overflows loophole, or the loophole of running service in the system promote their level of administration. Then they would leave back door or Troy programs for next logging.The maintenance personnel of intelligence network should guard against each one step of the attack from hackers. For example, when hackers are searching for targets, a firewall should be used to prevent their search and the sequential attacks. The structure of the current intelligence network is generally composed of servers (database server, WEB server and application server), routers and fire walls. Among them, servers, especially the WEB server, are easily attacked. If telecommunications operators'intelligence network are attacked or controlled by hackers, not only users'economy and information safety etc. would suffer, but the operators themselves would see great loss.
Keywords/Search Tags:The intelligence network, network checks, operating system, remote attacks, local attacks, firewall
PDF Full Text Request
Related items