Font Size: a A A

Ip Man Intrusion Monitoring System Design And Implementation

Posted on:2005-11-03Degree:MasterType:Thesis
Country:ChinaCandidate:L YangFull Text:PDF
GTID:2208360152465749Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Being the background of "The Project of FY02 MAN of CNC, Changzhou Branch", and based on the technology of broadband MAN, this paper is written in the combining the theory research with the practice application for setting up the networks security of Instruction Detection System (IDS) with misuse and abnormal detection, and building the networks security in the metropolitan area.At first, the paper fully expatiates the basic viewpoint of networks security, dynamic security model of P2DR, and the basic concept and classification of instruction detection. The paper deeply analyses and compares in detail the principles and classical sorts of misuse and abnormal detection, including expert system, pattern matching, and so on. At the same time, the paper discusses the basic principles of Host-based and Network-based IDS, and represents the detection rule of Network-based, matching algorithm, the data resource and model structure of Host-based IDS.The paper introduces the frame and the technical characteristics, and analyses the networks security question faced network companies. Based on the dynamic security model of P2DR and the technology of instruction detection system, the security system of IP MAN is built in virtue of Cisco Secure IDS.
Keywords/Search Tags:Intrusion Detection, Broad Band, Metropolitan Area Networks, Network Security
PDF Full Text Request
Related items