99网
您的当前位置:首页计算机英语论文网络攻击与防御.doc

计算机英语论文网络攻击与防御.doc

来源:99网


Computer English papers

Title: computer network attacks and prevent

Class: software college Name: lily Wang Studentid:20100420

Computer network attacks and prevent

Abstract: With the continuous expansion of network size, people become more aware

of the network knowledge. So the attacks on the network become more and more. These attacks have been a serious threat to the network and information security. Internet security and confidentiality of information are critical issues. There are both natural and man-made factors whether in the LAN (local area network) or WAN (wide area network) such as the vulnerability and potential threats. For these reasons, a series of measures and solutions were proposed to protect the network security. These means can achieve the purpose of protection from different angles and in different ways.

Key words: expansion; attacks; network; security; solutions;

Introduction: I come to know the knowledge about the insecurity of network through

reading several books. I give this paper in order to discuss the issues of network security and how to settle out these problems. Beginning of the article gives the definition of network security—it is an important aspect of computer information system security. The networks will under many attacks while people sharing resources and space through network.

For these reasons, the Network security issues can not be ignored. Designing of a network security system, we must not only effectively prevent the system to a wide range of network attacks, guarantee the safety of the system, and also have a higher cost-effectiveness, operational simplicity, and transparent to the user interface. Then,

1

this paper introduces four common network security attacks: L interruption, interception, modification and forgery.

Their attack target is different from each other. However, the sole purpose is to destroy the system resources, access to system resources or insert forged data to normal data transmission. Finally, this article highlights the Network security solutions.

These solutions include the deployment of Intrusion Detection System, vulnerability scanning system, the network version of the deployment of antivirus products and Honey pot.

Ability of intrusion detection is a way to measure a defense system is valid or not. This is an important role for a complete, powerful intrusion detection system. What’s more, this intrusion detection system can make up for the relative lack of firewall’s static defense. This system also can detect the various acts of real-time detection from the external network and the campus network to take corresponding measures. Using the most advanced system of regular vulnerability scanning system can detect workstations, servers, switches and other safety checks, and in accordance with the results submitted to the system administrator. The administrator provides detailed and reliable analysis of the security in order to enhance the overall level of network security has an important basis.

In the network anti-virus program, we eventually have to reach a goal is: To put the whole virus infection, dissemination and attack an end for the LAN. To achieve this, we take the corresponding anti-virus tools within the entire network which may be

2

infected and spread the virus. At the same time in order to implement and manage the entire network anti-virus system effectively and quickly, some special features such as remotely install, smart upgrade, remote alarm, centralized management, distribution killing and other features may be necessary.

A honey pot is a technology which running on the Internet computer system. It is designed to attract and lure the people who are trying to illegally break into other computer systems. Another use of the honey pot is to delay the attacker to attach the real target, allows an attacker to waste time on the honey pot. Thus, the initial targets have been protected. The valuable content has not been violated. In addition honey pot can provide useful clues to track the attacker and collect evidence for the prosecution of the attacker. In this sense, the honey pot is a trap in trapping the attackers.

Summary: Network security technology as one aspect of information security

technology, it is playing an increasing important role in Large-scale application of the Internet. With the popularity of the network more and more network security issues are appeared. With the development of hacking technology, traditional network security technologies can not meet the security needs of the people. New security technologies such as intrusion detection, vulnerability scanning and honey pot may gain growing attention. These technologies can resolve the emerging network security issues effectively from different ways. But a technology can only solve one aspect of the problem. We also need to develop new, more effective solution to solve the Problems that may occur at any time. In such a cycle, Human ability to solve network

3

security problems can be improved quickly. Main section:

References:

[1] Huang Yi-qiang, et al. On the software development needs analysis phase of the main tasks. Quarterly Journal of Sun Yat-sen University, 2002 (01).

[2] Hu Dao Yuan. Computer LAN [M]. Beijing: Tsinghai University Press, 2001. [3] Zhu Lisen, even Shougong. Computer Network Application Technology [M]. Beijing: Patent Literature Publishing House, 2001.

[4] Xie Xiren. Computer Networks (4th edition) [M]. Beijing: Publishing House of Electronics Industry, 2003.

4

因篇幅问题不能全部显示,请点此查看更多更全内容