Font Size: a A A

Cluster-based Network Architecture And Security Audit

Posted on:2005-11-10Degree:MasterType:Thesis
Country:ChinaCandidate:W D YanFull Text:PDF
GTID:2208360125964178Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
In human being civilization development, it is certain to the development of Internet, but in fact it should be a occasional result in the research of the people's science and technology. So, with the great development of Internet, the changing application requirements and the need for more security are eating away at the viability of the original Internet architecture. The design of today's Internet technology does not satisfy being guided by an architecture developed in the 1970s any more. The stability and security are both facing the challenge of various new Internet technologies. It is quite necessary in next-generation network that a new architecture might be designed to create greater functionality, generality, adaptability and robustness. An attempt, which sets a kind of new architecture with cluster, would be done here in this environment. The architecture, namely cluster unit, is founded with cluster system and aims for a sort of multiple-levels and distributed real-time security audit and responding structure. On the other hand, by monitoring the all system calls in kernel environment, the new system architecture will be set to improve the security response and strengthen the tolerance of the information system.
Keywords/Search Tags:Cluster, Linux, Network Security, System Architecture, System Calls, Security Audit
PDF Full Text Request
Related items