Font Size: a A A

Design And Implementation Of IDC Information Security System Based On Deep Security

Posted on:2022-04-28Degree:MasterType:Thesis
Country:ChinaCandidate:X Y LiFull Text:PDF
GTID:2518306575969239Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
As the development of Internet,traditional Internet business is gradually evolving to diversified and customized value-added Internet business.Internet Data Center(IDC)business provides Internet users with high-density,large volume data acquisition,storage,analysis and secondary use services.The amount of data collected and stored by large Internet Data Center(IDC)has reached an unprecedented density in human history.Improving the network information security protection ability of IDC is increasingly becoming a national network security issue and the growing objective demand of telecom market.The security requirement of Internet Data Center(IDC)in telecom market is more and more urgent.In view of the above requirements,this thesis makes a detailed analysis of the current situation of IDC Network of telecom operators in a province,and thinks that the IDC Network lacks an effective defense system in deep security,which can not satisfy the needs of national policies and market.After analysis and demonstration,this paper thinks that building an IDC information security system based on deep security will fundamentally solve the problems.This thesis studies and expounds the four key technologies of IDC information security system,including deep security.It mainly includes network boundary access control,security audit,IP fragment reorganization and deep security.According to the aboved programme and key technologies,this thesis first discusses the design objectives,hardware architecture,network architecture,supporting construction,software and hardware deployment,equipment configuration and other contents of IDC information security system in detail,carries out detailed functional verification and performance test of the system,and designs and realizes an IDC information security system based on deep security.The system adopts the key technologies such as network boundary access control,security audit,IP fragment reorganization and deep security,and successfully realizes the functions of IDC security event monitoring and disposal,virus protection,access control,log audit and intrusion detection.Experimental tests show that the system not only meets the national requirements for the Internet Data Center(IDC)network information security protection ability,but also can meet the market demand for IDC security.
Keywords/Search Tags:Internet Data Center(IDC), Information Security, Boundary Access Control, Fragment Reassembly
PDF Full Text Request
Related items