Font Size: a A A

Response Systems, Attacks Based On Network Topology

Posted on:2006-05-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y XiaoFull Text:PDF
GTID:2208360152497266Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Nowadays, there are more and more dangerous attack behaviors in ourcomplicated Internet. To help system administrators to know network structureand respond to attack behaviors quickly, a Response System for AttackBehaviors based on Network Topology is put forward.By finding network topology, this system can help users manage networkmore convenient. Moreover, with existing network resource assisting, thissystem can report attack behaviors and alarm users quickly. Then, based on thesystem of Attack Source Trace Back, some fast and effective responses can betaken during the course of intrusion.Firstly, the difficulties of current IP network topology research is discussedin this thesis, and problems for getting the accurate topology is be taken intoaccount too. Secondly, after the existing methods of finding network topologybeing analyzed, a new method for finding network topology in certainmanagement area is put forward and implemented. Finally, based on this newmethod, we can use the network topology to take corresponding responseactions according to the attack behaviors.The achievement of this thesis is that a Response System for AttackBehaviors based on Network Topology is designed and implemented. In thissystem, There are some improvements in gathering network topologyinformation and displaying network topology picture. On the basis of gettingand analyzing the topology of network, This system can avoid some commonproblems of response measures, define the response objects and improve theveracity and real time character of the response measures through optimizingand rectifying response measures.This system has been implemented and tested in a local area network andtaken a good effect.
Keywords/Search Tags:Network Topology, Response, Attack, Network Security, Attack Source Trace Back, Attack Route
PDF Full Text Request
Related items