人人范文网 范文大全

计算机英语论文网络攻击与防御

发布时间:2020-03-02 16:24:22 来源:范文大全 收藏本文 下载本文 手机版

计算机网络攻击和防范

摘要:网络信息的安全和保密是一个至关重要的问题。无论是在局域网还是在广域网中,都存在着自然和人为等诸多因素的脆弱性和潜在威胁。

关键词:计算机;网络;安全;防范

引言:本文旨在介绍现在的网络安全问题,网络攻击的方式,步骤,防范。防火墙的结构,类型,和具体应用。使大家对于一般的网络攻击有所防范,可以用防火墙进行查杀和防护病毒。

正文:

网络安全,是计算机信息系统安全的一个重要方面。如同打开了的潘多拉魔盒,计算机系统的互联,在大大扩展信息资源的共享空间的同时,也将其本身暴露在更多恶意攻击之下。如何保证网络信息存储、处理的安全和信息传输的安全的问题,就是我们所谓的计算机网络安全。信息安全是指防止信息财产被故意的或偶然的非法授权泄露、更改、破坏或使信息被非法系统辩识、控制;确保信息的保密性、完整性、可用性、可控性。信息安全包括操作系统安全、数据库安全、网络安全、病毒防护、访问控制、加密和鉴别七个方面。 设计一个安全网络系统,必须做到既能有效地防止对网络系统的各种各样的攻击,保证系统的安全,同时又要有较高的成本效益,操作的简易性,以及对用户的透明性和界面的友好性。

网络安全攻击,主要有四种方式L中断、截获、修改和伪造。

中断是以可用性作为攻击目标,它毁坏系统资源,使网络不可用。

截获是以保密性作为攻击目标,非授权用户通过某种手段获得对系统资源的访问。修改是以完整性作为攻击目标,非授权用户不仅获得访问而且对数据进行修改。

伪造是以完整性作为攻击目标,非授权用户将伪造的数据插入到正常传输的数据中。

网络安全的解决方案

一、入侵检测系统部署

入侵检测能力是衡量一个防御体系是否完整有效的重要因素,强大完整的入侵检测体系可以弥补防火墙相对静态防御的不足。对来自外部网和校园网内部的各种行为进行实时检测,及时发现各种可能的攻击企图,并采取相应的措施。具体来讲,就是将入侵检测引擎接入中心交换机上。入侵检测系统集入侵检测、网络管理和网络监视功能于一身,能实时捕获内外网之间传输的所有数据,利用内置的攻击特征库,使用模式匹配和智能分析的方法,检测网络上发生的入侵行为和异常现象,并在数据库中记录有关事件,作为网络管理员事后分析的依据;如果情况严重,系统可以发出实时报警,使得学校管理员能够及时采取应对措施。

二、漏洞扫描系统

采用目前最先进的漏洞扫描系统定期对工作站、服务器、交换机等进行安全检查,并根据检查结果向系统管理员提供详细可靠的安全性分析报告,为提高网络安全整体水平产生重

要依据。

三、网络版杀毒产品部署

在该网络防病毒方案中,我们最终要达到一个目的就是:要在整个局域网内杜绝病毒的感染、传播和发作,为了实现这一点,我们应该在整个网络内可能感染和传播病毒的地方采取相应的防病毒手段。同时为了有效、快捷地实施和管理整个网络的防病毒体系,应能实现远程安装、智能升级、远程报警、集中管理、分布查杀等多种功能。

四、网络主机操作系统的安全和人身安全的措施

网络防火墙作为第一道防线,并不能完全保护内部网络,必须结合其他措施,以改善该系统的安全水平。经过防火墙是基于网络的主机操作系统的安全和人身安全的措施。根据级别从低到高,即人身安全,主机系统,其核心业务系统安全,系统安全,应用服务的安全和档案系统的安全,同时,主机的安全检查和错误修复,作为以及备份安全系统作为补充的安全措施。这些构成了整个网络系统,第二道防线,主要部分的一个突破,以防止防火墙,以及攻击范围内。系统备份是最后一道防线网络系统,用于攻击后,系统还原。防火墙和主机安全的措施是整个系统的安全审计,入侵检测和响应处理器构成的整体安全检查和应对措施。从网络系统的防火墙,网络主机,甚至直接从网络链路层的提取网络状态信息,输入到入侵检测子系统。入侵检测系统按照一定的规则,以确定是否有任何入侵的事件,如果发生入侵,紧急处理措施,并产生一条警告消息。此外,该系统的安全审计中,还可以作为未来后果的攻击行为,并处理安全政策的系统改进的信息来源。

总结:

网络安全是一个综合性问题,涉及技术,管理,使用和许多其他方面,包括它自己的信息系统安全问题,有物理和逻辑的技术措施,是一种技术只能解决问题的一另一方面,而不是万能的。

参考文献:

[ 1 ]黄一强,等。论软件开发的需求分析阶段的主要任务。季刊中山大学, 2002年( 01 ) 。

[ 2 ]胡道元。计算机局域网模式[ M ] 。北京:清华大学出版社, 2001 。

[ 3 ]朱厘森,甚至守。计算机网络应用技术模式[ M ] 。北京:专利文献出版社, 2001 。

[ 4 ]渫西人。计算机网络(第四版) [ M ]档。北京:电子工业出版社, 2003 。

[ 5 ]孙小刚,韩栋,等。面向对象软件工程, Visual C + +的网络编程模式[ M ] 。北京:清华大学出版社, 2004,11

Computer network attacks and prevent

Abstract: Internet security and confidentiality of information is a critical iue.Whether in the LAN or WAN, there are both natural and man-made factors, such as the vulnerability and potential threats.

Key words: computer; network; security; prevent

Introduction:This paper aims to introduce the current iue of network security, network attack methods, steps to prevent.The structure of the firewall, type, and specific applications.So that in general have to guard against network attacks can be used for killing the firewall and virus protection.

The Main body:

Network security is the security of computer information systems in an important aspect.As the opening of Pandora\'s Box, the computer systems of the Internet, greatly expanded information resources sharing space at the same time, will be exposed in their own malicious more under attack.How to ensure that network storage, security and the transmiion of information security, is the so-called computer network security.Information security is to prevent information from the property have been deliberately or accidentally leaked authorized illegal, altered, damage or illegal information system identification, control; ensure confidentiality, integrity, availability, controllable.Information security, including operating system security, database security, network security, virus protection, acce control, encryption and identification of seven areas.Design of a network security system, we must not only effectively prevent the system to a wide range of network attacks, guarantee the safety of the system, and also have a higher

cost-effectivene, operational simplicity, and transparent to the user interface and friendly.

In the form of network security attacks,there are four main ways L

interruption,interception, modification and forgery.

Interruption of availability is the object of the attack, which destroyed the system resources, so that the network is not available.

Intercepted by the object of the attack the confidentiality, non-authorized users acce to a means of acce to system resources.

Modify the object of the attack on the integrity, non-authorized users gain acce not only data but also to be amended.

Forged by the integrity of the object of the attack, non-authorized users to insert forged data to normal data transmiion.

Network security solutions

First, the deployment of Intrusion Detection System

Ability of intrusion detection is a measure of an effective defense system is an important factor in a complete, powerful intrusion detection system, a complete firewall can make up for the relative lack of static defense.From the external network and the campus network of the various acts of real-time detection, to detect all poible attempts to attack and take corresponding measures.Specifically, intrusion detection is to switch on the engine acce center.Intrusion Detection System Intrusion Detection set, network management and network monitoring functions, both inside and outside the network in real-time capture of all data transmiion between the use of built-in features of database attacks, the use of pattern matching and intelligence analysis to detect the occurrence of network intrusions and anomalies, and in the database record of the incident, as a network administrator based on hindsight; if in serious condition, the system real-time warning can be iued so that the school administrators to take timely measures to deal with.

Second, vulnerability scanning system

Using the most advanced system of regular vulnerability scanning workstations, servers, switches and other safety checks, and in accordance with the results to the system administrator to provide detailed and reliable analysis of the security, to enhance the overall level of network security have an important basis.

Third, the network version of the deployment of antivirus products

In the network anti-virus program, we eventually have to reach a goal is: To put an end to the LAN in the whole virus infection, diemination and attack, in order to achieve this, we should be in the entire network at risk of infection and the spread of the virus to take place The anti-virus tools.At the same time in order to effectively and quickly implement and manage the entire network of anti-virus system, should be able to remotely install, smart upgrade, remote alarm, centralized management, distribution of a variety of functions such as killing.

Forth, the network host operating system security and physical security measures

Network firewall as the first line of defense and can not fully protect the internal network, must be combined with other measures to improve the safety of the system level.After the firewall is based on the network host operating system security and physical security measures.In accordance with the level from low to high, namely, the physical security of the host system, the core operating system security, system security, application services security and file system security; At the same time,

host security checks and bug fixes, as well as a backup safety system as a

supplementary safety measures.These constitute the entire network system, the second line of defense, the main part of a breakthrough to prevent the firewall as well as attacks from within.System backup is the last line of defense network system, used to attack after the System Restore.The firewall and host security measures is the overall system security by auditing, intrusion detection and response proceor constitute the overall safety inspection and response measures.It from the network system firewall, network host or even directly from the network link layer on the extraction of network status information, as input to the intrusion detection subsystem.Intrusion Detection System in accordance with certain rules to determine whether there is any invasion of the incident, if the invasion occurred, the emergency treatment measures, and generate a warning meage.Moreover, the system\'s security audit also can be used as the future consequences of aggreive behavior and to deal with security policy on the system to improve sources of information.

Summary: Network security is a comprehensive iue, involving technology,

management, use and many other aspects, including both its own information system security iues, there are physical and logical technical measures, a kind of technology can only solve the problem on the one hand, rather than a panacea.

References:

[1] Huang Yi-qiang, et al.On the software development needs analysis phase of the main tasks.Quarterly Journal of Sun Yat-sen University, 2002 (01).

[2] Hu Daoyuan.Computer LAN [M].Beijing: Tsinghua University Pre, 2001.

[3] Zhu Lisen, even Shougong.Computer Network Application Technology [M].Beijing: Patent Literature Publishing House, 2001.

[4] Xie Xiren.Computer Networks (4th edition) [M].Beijing: Publishing House of Electronics Industry, 2003.

[5]孙小刚, Han Dong, et al.Oriented software engineering, Visual C + + Network Programming

[M].Beijing: Tsinghua University Pre, 2004,11.

网络攻击与防御论文2

《网络攻击与防御技术》课程设计教学大纲

网络英语论文

网络信息安全的攻击与防护

网络攻击技术与攻击工具六大趋势

计算机英语论文翻译毕业设计

计算机防病毒、攻击系统管理制度

计算机与网络(全文)

网络攻击研究和检测

电脑网络遭攻击事件心得体会

计算机英语论文网络攻击与防御
《计算机英语论文网络攻击与防御.doc》
将本文的Word文档下载到电脑,方便编辑。
推荐度:
点击下载文档
点击下载本文文档