Font Size: a A A

Based On Windows Server 2003 Hacking Prevention System

Posted on:2007-05-15Degree:MasterType:Thesis
Country:ChinaCandidate:G L DongFull Text:PDF
GTID:2208360185982420Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the great progress in computer net works and information technology, the Internet has become an important part of our daily life. While people depend on computer networks more and more, net work security becomes a serious problem. There are number of ways to protect our net works, such as firewall ,access control and cryptography, etc. However, with more and m ore vulnerabilities have been exploited and the advance of attack technique, it is realized that limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers 'intrusion. Therefore, on the basis of the analyses about the related studies inboard and outboard, the author develops an effective intrusion defense system owing to his work on supervision about computer net security.The main work in this dissertation is summarized as follows:1. A basing on Windows Server 2003 approach of hacker's intrusion is proposed, which provides reference to the research on the attack classification.2. The frame of intrusion defense system is developed based on the defence and strike.3. The technology of IP tracing is very important in the system, it make it possible to find the hacker and accuse it.4. Combining the computer forensics to the intrusion defense system, this system is not only a technology, it can do a lot for the law to strike to the hackers.5. New hacker technology has been summarized and we should fight with it toward a new direction.The consummation of this paper will make contributions to network security research and improvements on performance of network security protection in our country.
Keywords/Search Tags:intrusion defense system, IP tracing, computer forensics
PDF Full Text Request
Related items