Font Size: a A A

Network Active Safety Technology Research

Posted on:2013-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:J YeFull Text:PDF
GTID:2248330374986700Subject:Information security
Abstract/Summary:PDF Full Text Request
With the rapid development and the wide use of computer and network technology,intranet, as an important information resource vector and information-sharing channels,play a important role in the enterprise business and personal use. But how to betterprotect network security have become important issues and the vital interests of theusers. Traditional network protection technologies are unable to cope with the problemof the intranet security for the better, such as firewall and instruction detection system.Further more, the traditional network protection technologies act as a passive role. Theactions of the hackers can only be detected after the attack. Thus, the protection is at thedisadvantage. Therefore, recently a new Intranet Active Protection Technology has beena focus to the network security researchers. It is a proactive protection technology.These technologies take some effective measures to check and prevent the possibleintranet and make the protective sides occupy a favorable position in the offensive anddefensive game. Vulnerability scanning technology and honey net technology are thetypical intranet active safety technology.Intranet active security system in this paper is a all-around security system whichcan play the roles such as detection, prevention and response. It is based on thewindows and uses many technologies, including port scanning techniques, the operatingsystem identification techniques, vulnerability scanning technology, plug-in technology,remote query technology and remote control technology. The system uses thesetechnologies in accordance with the active mechanisms and so it has somecharacteristics.1. Compared with the traditional internet security system, the system’s feature isinitiative. Over the pre-detection and prevention mechanisms, intranet protectors canoccupy the active position in the net.2. Compared with the existing intranet active security system, the system’sfeatures are multi-angle prevention and detection conjunction with good control response. So, it is not just detective system but also a remote control system which canrespond in time. For example, as a typical active safety product, the vulnerabilityscanner can only detect the intranet and alert, but it has no other responses.the systemin this paper can detect the intranet vulnerability and query other high-risk areas ofsecurity as a measure to compensate for the vulnerability scan system’s blind spot. Inaddition, it can operate the remote console of the target host According to Vulnerabilityreport.Preliminary, this paper analysis of the intranet attack techniques. It analyze thefocus of the intranet protection from the this opposite point of view. Then it analyses theintranet security model.After that, it Proposed and implemented the prototype of theintranet active safety system. Finally, we prove the system’s feasibility throughexperiment and testing.
Keywords/Search Tags:Intranet, active security technology, preventive dectect, response
PDF Full Text Request
Related items