Font Size: a A A

Campus Network And Implementation Of Self-defense

Posted on:2009-10-13Degree:MasterType:Thesis
Country:ChinaCandidate:H LiFull Text:PDF
GTID:2208360248953055Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network and communication technology, the typical opening internet, namely Internethas dramatically enlarged the scale. But inborn crazy factors about network society, such as virus, hacker, illegality incursion, unwell information and so on, they are threating network healthy development continually and network application be up against excessive risks. Facing such an rigor actuality, relevant departments in many governments have to attach importance to the network security, they have exploited many kinds of network security products, such as Intrusion Detection System(II)S), antivirus software and so on to prevent and deal with varieties of crazy factors in order to undertake network security. In face of such condition, network security problems are still rigorous. Traditionally, we solve the problem by a single improved or optimized security method or by a loose combination of them. Apparently, considering the fact that the attackers have mastered more and more knowledge, we can not solve the problem with the traditional method in the complicated network environment. Only if we develop an all-around security self-defense system with diversified, but harmoniously synthesized security methods, we can effectively improve the network information security.Regarding the campus network of Guizhou Normal University as the basic network model, this article expounds the current safety actuality of the current campus network, thoroughly and incisively analyzes the major problems and the routine safety technologies. On the basis of analyzing the limitation of traditional safety model and P2DR safety model, this article, combining with the systematical practical exploitation requirement, conducts the intensive study and analysis in terms of the self-defensive safety model, probes into the self-defensive strategy, studies the systematical frame of the self-defensive system. Based upon these, the concrete achieving scheme of the network self-defense has been made and the key technologies which have been applied in this system have been researched: The intensive study is carried out aiming at the inclusive filtration, substituting as well as the address translation (NAT) technology of the fireproofing wall, and especially the realization process of substituting server has been dissertated in detail. In addition, this article analyzes the characteristics of mutually complementary function in terms of the fireproofing wall and invading testing system in the process of the safety defending, conducts the interactive design of the fireproofing wall and invading testing, studies the VPN technology, solving the safety threat, namely, vicious attacking, posed by using a special line to connect the interactive digitals as well as the safety of data when conveyed on a special line between the school community networks of the campus network. The systematical study has been carried out aiming at ensuring integrity, secrecy for conveying data and the IPSec agreement of the Internet Safety Agreement verified by identity. It introduces how to design and realize the anti-virus system in the surrounding of the campus network, aiming at the impact and harming that the large scale eruption of the network worms produce so as to study a safe campus network defense system structure in order to prevent or defend the spreading and damage of worms. Aiming at how to solve the safety problem in the process of data saving, as well as the software and hardware that data aptitude backup involve, the detailed design has been conducted. According to the data backup strategy, the distribution disposal or centralized management of data shall be realized and the aptitude recovering of data shall be conducted under the circumstance of data loss and invalid data.
Keywords/Search Tags:self-defensive system, fireproofing wall, invading testing, IPSec agreement, anti-virus, data backup
PDF Full Text Request
Related items