Font Size: a A A

Study On Information Security For Resource Management System Of Multisource Remote Sensing Data

Posted on:2012-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:M HeFull Text:PDF
GTID:2218330362950590Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
As the rapid development of the technology of multi-source remote sensing, the application of remote sensing data has been used widely. This paper will research on network security of multi-source remote sensing system. The system is aiming at the application of the scattered remote sensing data, and it contains data query, order request, mission planning and application platform demo, and most important is that this system is the milestone of the application of China's remote sensing data. Because of the dispersion of the remote sensing data, this system will transport important sensing data on internet, therefore, the assurance of the security of remote sensing data and the safety of multi-source remote sensing system become the key of this system.Through the analysis of multi-source remote sensing system, this paper provides passive protection from the user authentication and data security transmission. The user authentication module adopts the improved password authentication mechanism and role-based access control privileges. This measure make sure of the security of the multi-source remote sensing system, and is the first defend line of this system.The data security transmission module uses digital signatures and the combination of technology of symmetrical encryption and asymmetric encryption. First of all, we should make sure the right people you will transmit the data, and then, encrypt the data you transimit. This measure is the second defend line of this system.And then, the intrusion detection algorithm is researched for the active defense of this system, this paper adopts active learning support vector machine algorithm for network behavior classification, and then combining with the discrimination, k-means clustering algorithm improved active learning support vector machine. At last, comparative experiments have made on the two algorithm's classification performance for the discussion of their advantages and disadvantages.Finally, this paper makes experiments for multi-source remote sensing system on user authentication, data security transmission and anomaly detection algorithm of classification, this three aspects verify the feasibility of the safety measures.This paper makes the scientific and complete construction for multi-source system, and through the system confirmed the feasibility of user authentication and data security measures. On the aspect of intrusion detection algorithm, the experimental results have made a great enhancement, and this will have important applications in offline.
Keywords/Search Tags:Information Security, Intrusion Detection, Support Vector Machine, Active Learning, Clustering Algorithm
PDF Full Text Request
Related items