Font Size: a A A

Research On Hierarchical Computer Network Security Evaluation And Protection System

Posted on:2017-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:G LiFull Text:PDF
GTID:2308330482489834Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the new generation, with the continuous expansion of the computer network to the worldwide range. The network defense system is now more and more careful and delicate. But still the changes and the improvement could not prevent the increasing sophisticate and increasingly global regionalization virus attack. The first generation of information protection technology is the assumption that can be assumed to clear the edge of the network, and can achieve the protection and isolation system integrity, availability, controllability and non repudiation on the boundary. The second generation of safety protection technology as the core technology to detect, to restore the technology as the backing, integration of protection, detection, response, recovery of four, but the detection system to find all of the attack is very difficult. When the attack has occurred and caused harm, nor can the system recovery technology the attack restoration has become a security system. Therefore, research on how the information system survivability in network attack situations is of great significance, that is, the third generation of technology to pay attention to the main problem.With the popularity of computer technology and extensive application of the network, Internet has in-depth to people’s life and work in each part. But when people use network, the impact on the network virus and hacker attacks have become an important factor in threats to network security. Evaluation of a layered network security is able to through sophisticated computing catch the weak link of the network security. So that users can according to their own needs for the network security of a targeted manner to strengthen, with the least resources to achieve maximum security.The main thrust of this paper is to study network security tiered evaluation of technical, design feasibility of the programmed, implementation the online network security tiered evaluation system. In this design reference to a large number of network security at home and abroad on the demarcation of the tiered approach, by a set of basic network security model.The system is based on the Windows operating system, use Eclipse4.5.1 platform, tomcat6.0 server, SQLSever2012 database development. Application of the fuzzy algorithm, the network has overcome the past in the process of assessing the use of discrete ways. Resolve the problem which is the assessment results in a breakdown of data on both sides of the outcome of two entirely different issues. In this system, application of the JSP, Java Script technology, implementation of the network users by the types of settings, the use of scientific experts to network security and indicators of the weight is given, the general types of network users for evaluation,And intuitive evaluation and specific parameters. Looking forward to the future, with the globalization of economy more and more closely in the future, network security technology will be prepared to learn humbly from the world’s top technology, and continuously learn the latest security technology, finally we could realize the application of the world advanced technology of computer network for the security protection of our country.
Keywords/Search Tags:network security, computer security, tiered assessment, fuzzy algorithm, JSP
PDF Full Text Request
Related items