Font Size: a A A

Research And Design Of Network Security Defense System

Posted on:2004-10-02Degree:MasterType:Thesis
Country:ChinaCandidate:S MiaoFull Text:PDF
GTID:2208360095450852Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
Computer networking is one of the fastest growing technologies in our culture today, and it makes human life more convenient than before. While there are still some hackers doing kinds of destructs by using the security holes, so network security is the most important issue that we now pay more attention to.Firewall and Intrusion Detection System are the important traditional methods to protect network from being intruded. The goal of these methods is to keep intrusion out of the network that we want to protect. We can build a relatively perfect defense system by using firewall and IDS. However, as for how to identify the hacker and how to collect and analyze attacker's information, a completely new technique must be developed.Honeypot is a new concept in the field of network security. It allures attacker by some obvious security holes, at the same time, monitors the hacker's behavior and records all the information for further analysis. According the log data, we can look up the latest intrusion behaviors and security holes, so accordingly we can build more security into the whole system.In order to make the honeypot system to collect attacker's information, NAT Router is introduced. The kernel of NAT Router is Network Address Translation technique that distributes packets into different places. Once the intrusions are detected, the intruding packets can be distributed into honeypot system by the NAT Router.Combining NAT Router, Honeypot, Firewall and IDS together, the network security can be improved greatly. In this way, not only we protect the network from being intruded as the traditional methods do, but also we can monitor our network system running, collect the hacker's information and analyze hacker's behaviors, therefore building more security into it.
Keywords/Search Tags:IDS, Network Security, Honeypot, NAT
PDF Full Text Request
Related items