Font Size: a A A

Study On The Attack And Prevention Strategies Of Security Vulnerabilities Innetwork Communication Protocol

Posted on:2015-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:Y FengFull Text:PDF
GTID:2268330425493700Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The network is the second half of the twentieth Century contribution to human society profound influence biggest, most inventions. The influence of network on society beyond the past any time information transmission means, whether it is the second half of the nineteenth Century have been the invention of the telegraph, telephone, radio communication at the end of the nineteenth Century, or twentieth Century20’s invention of TV brings to the social life and the Internet are notcomparable, because it is the epitome of the invention, is the mainpushing the human society and the platform of globalization.But every coin has two sides, bring in many aspects and quick to human society at the same time, also has brought the security threat undeniable and hugechallenge to national and personal information security and privacy. This paper elaborates the network protocol security from the network attack and defense, protocol and security solutions perspective. To show thatthe network communication from the background and principle of networksystem is introduced. Detailed study of each layer role and potential security threats from the hierarchical network. Probing into the data link layer, network layer protocol and the related theory of transport layer protocol and potential defects can lead to the risk of network; networkprevention in mainstream prevention technology and equipment is now.Based on analysis and test the network communication environment.using the related theory and practice of how to avoid and prevent, and gives theoretical or practical prevention strategies. This paper mainly discusses the security vulnerabilities and prevention strategies of the physical network layer in wireless networks.
Keywords/Search Tags:network protocol, security, prevention strategies, communication, vulnerability
PDF Full Text Request
Related items