Font Size: a A A

Intrusion Detection Technology In The Campus Network And The Realization

Posted on:2008-10-21Degree:MasterType:Thesis
Country:ChinaCandidate:L X GanFull Text:PDF
GTID:2208360212499612Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The development of calculator network, made the information share incr The development of calculator network, made the information share increasingly and extensively with go deep , the share of information brought people tremendous convenience, but information shared also brought people tremendous threat, on the public correspondence network saving, deliver and share an information, may be eavesdrop, intercept, modified by the illegal invader or destroy, cause the loss that can't estimate thus. So the network safe problem become a core problem of information-based construction. Traditional calculator network's protection generally the technique used. The fire wall technique, identity attestation, data encrypts, numeral signature, safety supervision etc.These techniques all can had certain protection to the attack of network, however along with the development of calculator network, and various attack means of complicate gradually, diversification, these traditional network defense the system can be static only of, carry on defense passively, can't satisfy at present the demand of safe condition, so needed a kind of defense system that can defended actively to appear urgently. Invading an examination system is according to this kind of condition to descend to emerge with the tide of the times of a kind of active defense examination system.Intrusion Detective System is the importance of the network safe protection system to constitute part.It is a kind of active network safe protection measure.It collects an information actively from the system inner part and various network resources, from in the analysis possible network invade or attack stone, lowering the bane that may invade with maximum limit.Circulate on high campus net in the school along with the propulsion of high information-based progress in the school of apply system more and more, the information system becomes more and more huge with complications.Along with the fast growth of network customer, the universality of[with] calculator knowledge with thorough, campus net from educated in former times, the role of the on trial net of[with] research has been already changed education, the research kimono's duty laid equal stress on of taking and having luck camp the network of the property, Be numeral turn an information the most important delivered to carry a body, how promised it a safety to become a pressing question of high school.So this text adopts the model that the forerunner invades an examination technique's design to correspond to resolve the safety problem of campus net for the frame of campus net.Combine a distribute type to invade examination system through careful analysis after passing to acquaint with the whole campus network structure, carried on the demarcation of the whole structure to the whole campus net, and design a model now.The system's structure divides the line for total school lord control center to one a class network structure, divide school network management system is second class network structure and branch organization network management system is x-rated network structure.In the design in its system, to the high and dependable of the system, can use sex, function with with each other allied all do full consideration.Designed a x-rated safe model of the centralized management network, and set up from the boundary protection and deliver a layer of protection on this foundation, arrive the deep defense system of protection of the core host to insure the safety of its campus network system.
Keywords/Search Tags:Intrusion Detective, Intrusion Detective System (IDS), Network security
PDF Full Text Request
Related items