Font Size: a A A

Network Co-invasion Of The Response And Independent Accident Rapid Recover Technology Research

Posted on:2007-07-03Degree:DoctorType:Dissertation
Country:ChinaCandidate:Z H LiFull Text:PDF
GTID:1118360212967728Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With rapid expansion of Internet, the applications based on network are more and more widespread. Hacker's attack methods also become diversified. Incident of network becomes large-scaled one and threats the global network. Loss caused by incident is getting huger and huger. Therefore, this thesis studies the technology of cooperative intrusion response and quick autonomous recovery of disaster. A multi-level defensive system is developed, which can cooperate with the others and quickly response to large-scale intrusion. A disaster tolerance system is established in the thesis to realize quick autonomous recovery of important data. A low-cost, high-reliability disaster tolerance plan is proposed, which can be adopted widely.This thesis is supported by two National High Technology Development 863 Program of China under Grant No. 2003AA142060 and 2001AA142100. One is the Study on Integrated Network Security Technology; the other is the Study on Hacker Monitoring Technology.The main work and the innovation of the study are as follows.1. A cooperative intrusion response model is presented. The defensive strategy of global defense is used to prevent widespread intrusion in large-scale network. In the system, all defensive components work interactively and adopt dynamical defensive strategies. The incident can be audited timely, early-warned, identified and responded quickly. Loss can be minimized.2. A model of quick autonomous recovery of disaster is presented. By monitoring crucial data file, the system can automatically update the replicas or restore the data. The model provides security, correctness, availability of crucial data. Replicas can be stored reliably in normal storage device of remote network based on this model.3. A Linear Error Correction Code (LECC) algorithm is presented to resolve low-speed and low-reliability flaw problem in data transmission of backup and recovery. LECC divides crucial data file into pieces for encoding and send the encoding pieces over erasure channel (such as the Internet). The decoder can recover...
Keywords/Search Tags:Network Intrusion, Cooperative Intrusion Response, Quick Data Recovery, Autonomous Disaster Management, Multi-Source Transmission, Remote Data Synchronization
PDF Full Text Request
Related items