网络安全事故论文:网络安全事故应对策略分析与实现

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

网络安全事故论文:网络安全事故应对策略分析与实现
【中文摘要】传统的网络安全方案主要采用的是防御为主的安全策略,通过防火墙、杀毒软件、安装系统补丁等手段加强网络的防护能力,从而达到抵御网络攻击者的攻击的。

随着对网络安全性要求的不断提高,逐步出现了网络攻击检测系统、蜜罐技术等基于主动防御的网络安全手段,但在实际的使用过程中,并没有形成一个完整的体系,对网络攻击的防范以及网络事故发生以后的处理作用有限。

在对网络安全监察、网络攻击防御、网络数据备份恢复等理论与技术进行研究的基础上,研究了网络安全事故应对的策略模型,并利用软件工程的相关理论与方法,结合编程语言,实现了该模型的相关应用模块。

与网络安全防范与抵御不同,网络安全事故应对策略主要研究的内容是如何在网络安全事故已经发生的情况下,及时对网络进行恢复,保证数据的安全性,增强网络的数据备份能力,同时,能够记录攻击者的信息,改变以往以防御为主但却往往防不胜防的网络安全策略,将被动的防守变为主动的应对与信息记录,增强网络的自我恢复能力。

模型包括三个组成部分,一是攻击信息记录技术,主要利用网络安全监察技术,对可疑的网络数据流以及网络链接进行检测,获取并保存网络攻击者的相关信息,这些信息可以为攻击防御系统以及数据备份恢复系统提供可靠的依据,也可以在事后对网络攻击行为的分析与对策研究中起到重要作用;二是攻击防御技术,主要是以攻击信息记录系统中获取的攻击者攻击的相关信息为基础,运用了蜜罐技术和系统漏
洞扫描技术,从而建立起立体的攻击防御体系,实现对网络攻击行为
的防护和抵御;三是网络数据备份恢复技术,它的目标是实现一个低
成本、高性能,与网络中其他安全设备与系统协同工作的多数据备份恢复系统,分析并设计了其总体的结构和工作流程,实现了对大规模
数据文件的多点备份和快速恢复,对远程数据的高效同步策略等。

【英文摘要】Traditional network security solution is mainly a defensive-oriented security policy, which strengthens the network of protection through the firewall, antivirus software, installing system patches and other means in order to achieve the purpose of protecting network from the attacker’s aim. With the need of higher performance of network security requirement, gradually there come out the network attack detection system and honeypot technology and so on, most of which are based on active defense network security tools, but in actual application, none of them forms a complete system whose function for network attack prevention and treatment is limited when accident happens.On the basis of the study of the theory and technology of network security monitoring, network attack prevention, network data recovery and backing up, this paragraph both researches on network security incident response strategy model and achieves the various applications of the model with using the theory and methods of software
engineering combined with programming language. Different from network attack prevention and protecting, the main content of network security incident response strategy are with situation happened how to restore the network, how to ensure data security, and how to enhance network data backup and recovery; also at the same time, attack defense system can record form the attacker the information, change the security policy which was always protecting but failed all the time into active defense response and information recording to make network strong enough to recover by itself. This model consists of three components, first of which is namely the attack of information recording technique, who mainly takes advantages of attack detection and network security monitoring technology to capture and save the network attacker relevant information by examining network traffic and network link that can provide a reliable basis for attack defense systems, data backup and recovery system, also play an important role in both the analysis of network attack and study of countermeasures.The second one, attack defense techniques, mainly based on the information recording system to obtain information about the attack, embedded both the honeypot technology and system vulnerability scanning technology into attack detection and
prevention system, in order to build a three-dimensional attack defense system that can achieve protection of network attacks and resist. The last one, network of data backup and recovery techniques, whose goal is to be a backing up and recovery systems that can achieve a low-cost, high performance, be able to work with other network security devices and deal with more data backup. In this passage, the writer did the work on the analysis, design of the structure and its overall workflow, to achieve large-scale multi-point data file backing up, rapid recovery and strategy for synchronization of large distance data with a high efficiency.
【关键词】网络安全事故漏洞扫描网络数据备份攻击防御
【英文关键词】Network Security Incidents Vulnerability Scanning Network data backupy Attack defense
【备注】索购全文在线加好友:1.3.9.9.3.8848
同时提供论文写作一对一指导和论文发表委托服务
【目录】网络安全事故应对策略分析与实现摘要
3-4Abstract4-5第1章绪论8-14 1.1 课题研究的背景
与意义8-9 1.2 国内外发展现状9-12 1.2.1 网络行为信息记录9-10 1.2.2 攻击防御技术的国内外研究现状10-11 1.2.3
数据备份恢复的国内外研究现状11-12 1.3 论文研究的主要内容与结构12-14第2章相关理论基础与技术14-20 2.1 网络安全事故及应对策略理论14-15 2.2 网络监察与取证技术
15-17 2.3 攻击防御技术17-18 2.4 数据备份恢复技术
18-19 2.5 本章小结19-20第3章网络安全事故应对策略模型20-26 3.1 关键系统的关键任务20-23 3.1.1 关键系统及任务的需求分析20-21 3.1.2 过程能力分析21 3.1.3 关键系统的可靠性要求21-23 3.2 模型设计的原则与目标23-24 3.3 网络安全事故应对策略模型24-25 3.4 本章小结25-26第4章网络安全应对系统的设计与实现26-50 4.1 系统的总体设计
26-28 4.2 安全信息提取与分析子系统的设计与实现
28-38 4.2.1 网络监控及处理的设计与实现28-31 4.2.2 具体实现过程31-38 4.3 主动防御子系统的设计与实现
38-44 4.3.1 主动防御子系统的设计原则39 4.3.2 蜜罐功能设计39-42 4.3.3 安全漏洞扫描功能设计42 4.3.4 具体实现过程42-44 4.4 数据备份与恢复子系统的设计与实现
44-49 4.5 本章小结49-50第5章系统测试50-56 5.1 测试实验环境的搭建50-51 5.2 测试具体过程及结果
51-54 5.2.1 内网整体安全性测试51-52 5.2.2 服务端口扫描测试52-53 5.2.3 数据备份功能的测试53-54 5.3 本章小结54-56总结与展望56-58致谢58-59参考文献59-63。

相关文档
最新文档