Font Size: a A A

Mobile Law Enforcement Research And Design Of The Information Collection Terminal

Posted on:2011-12-23Degree:MasterType:Thesis
Country:ChinaCandidate:L YeFull Text:PDF
GTID:2208330332477289Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Information and Network, the entire world gets together and people get in touch with each other more conveniently. Generally, this success attribute to the rapid development of computer and network. Computer network has become the basis of national economy and the whole at some degree. Nearly all the companies and organization build their own network and comminute with each other through net. Computer network has enhanced its location in our economy development and daily life. The operation of our society relies on computer network mostly.With the network developing, many problems have come up, especially safety problem. Now virus and Trojan spreading through our network brings a lot of inconveniences. Hacker has invaded every corner of society, which influences national safety and personal privacy seriously.Whether we can find network infusion rapidly will become a problem every computer user must face up with.In this thesis, our contents based on the situation that decadent content has spread across our network and our privacy has been threatened. Based on its situation, we develop a simple intrusion detection system. The current network use password or access control to protect our computer and net from damaged. However, when this access password loses or being stolen, hacker may get access to this system. It will do great damage to our system or us. Moreover most of system can't protect threaten from internal. Records may be the only way to detect authorized users'work. IDS is used to be a safety technology to detect the attacks. It provides the protection from internal and outside attack. It can be divided by function to three different parts:NIDS, HIDS and DIDS. And it can also be divided by the way of analysis. There are anomaly detection and abuse detection.In this thesiswork we primary complete the construction and research of IDS.
Keywords/Search Tags:ids, network, anomaly detection
PDF Full Text Request
Related items