Forum Europejskie Centrum Integracji i Rozwoju Strona Główna Europejskie Centrum Integracji i Rozwoju
ECID WITA


ugg boots ireland Detection of network hacking and

 
Napisz nowy temat   Odpowiedz do tematu    Forum Europejskie Centrum Integracji i Rozwoju Strona Główna -> Ogólne
Zobacz poprzedni temat :: Zobacz następny temat  
defgf67ay




Dołączył: 29 Paź 2010
Posty: 863
Przeczytał: 0 tematów

Ostrzeżeń: 0/5
Skąd: England

 PostWysłany: Nie 0:54, 21 Lis 2010    Temat postu: ugg boots ireland Detection of network hacking and Back to top

Hackers and implementation of intrusion detection research


Put the center platform of the audit data needs to send to each operating system. The center test platform consists of expert system, knowledge base and an administrator, whose function is based on a proxy server to audit data collection expert system analysis, a system safety reports. Administrators can provide security to the various host management capabilities, according to the analysis of expert systems in various proxy servers to send audit data needs. In addition, the test platform in the center and the proxy server to communicate through a secure RPC. 6, the advantages and disadvantages of intrusion detection systems (1) Intrusion Detection System offers several advantages: 1) improve the information security system, the integrity of other parts; 2) to improve the monitoring capacity of the system; 3) to track user access to exit from all activities or influence; 4) recognize and report changes to the data file; 5) found that the system configuration errors, if necessary, be corrected; 6) identify specific types of attacks, and to alert the appropriate personnel in order to make defense response; 7) makes the system managers to upgrade to the latest version of the program; Cool allows non-expert personnel engaged in security work; 9), the creation of information security policy to provide guidance. (2) to intrusion detection systems are not omnipotent, they can not make up for weak identification and verification mechanisms,[link widoczny dla zalogowanych], in particular in: 1) in the absence of intervention, can not perform checks on the attack; 2) can not be perceived corporate security policy content; 3) can not make up for network protocol vulnerabilities; 4) can not make up for the quality of information systems or the integrity issues; 5) of the network is busy they can not all transactions; 6), the data are not always packet-level attacks for processing; KejiQianYan ◆ frontier science and technology l7) they can not cope with modern network hardware and features. 7 Prospects for intrusion detection methods in terms of size and technology have changed the invasion, the invasion with the means and technology with the \The future of intrusion detection can be broadly towards the following three directions: (1) Distributed intrusion detection: the first layer of meaning, that is, distributed network attack against the detection method; second meaning that the use of a distributed approach to achieve distributed attacks, the key technology for the detection of information processing and intrusion collaborative global information extraction. (2) intelligent intrusion detection: the use of intelligent methods and tools for intrusion detection. The so-called intelligent methods commonly used at this stage there are neural networks, genetic algorithms, fuzzy techniques, immune theory and other methods, these methods are commonly used in the invasion of feature recognition and generalization. Thinking of using expert system to build intrusion detection system is one of the methods used. Self-learning ability, especially the expert system, and the continuing escalation of the knowledge base language extensions to make the design of intrusion detection system to prevent and continuously enhanced, should have wider application. Application of the concept of agent for intrusion detection attempts have also been reported. More consistent and efficient solutions should be regular in the sense of intrusion detection systems and intelligent detection of the detection software or a combination of modules used. (3) a comprehensive security defense programs: the use of safety engineering risk management ideas and methods to deal with network security, network security will be handled as a whole works. From the management, network architecture, encryption, access, firewall, virus protection, intrusion detection, a comprehensive multi-faceted concerns of a comprehensive assessment of the network, and then propose a comprehensive solution possible. As Intrusion Detection, must closely track and analyze the international invasion of technology development, and constantly get the latest attack methods. By analyzing the known attack methods, rich detection capabilities of early warning systems. Strengthening and use of early warning systems audit, track and field record,[link widoczny dla zalogowanych], record and feedback anomalies. An example of feature extraction of suspicious network activity, expand the system's detection range,[link widoczny dla zalogowanych], enabling the system to cope with the unknown intrusions. By attacking technological research to create new intrusion method, and applied to the detection technology. Ring [References] [1] Dong Guanglong. WindowsServer2003-based prevention system of hackers. Shandong University,[link widoczny dla zalogowanych], 2006.4 [2] Zhang big. High-speed Ethernet-based intrusion detection system. Dalian University of Technology, 2003.3 [3] PROCEEDINGS. Network Intrusion Detection System Research and Analysis. Xi'an Architecture and Technology, 2004.3 [4] CARE. Computer network security technology. People Post Press,[link widoczny dla zalogowanych], said of :200909-21 Received Author: Wu Zhiwen, Central South University, postgraduate, Yongzhou Associate Professor of Computer Technology, research direction: computer network technology. Electrical and Information 3O 2009 of the total 240 in 19
More articles related to topics:


[link widoczny dla zalogowanych]

[link widoczny dla zalogowanych]

ugg botas Prospects for Development Cooperation in


Post został pochwalony 0 razy
 
Zobacz profil autora
Wyświetl posty z ostatnich:   
Napisz nowy temat   Odpowiedz do tematu    Forum Europejskie Centrum Integracji i Rozwoju Strona Główna -> Ogólne Wszystkie czasy w strefie EET (Europa)
Strona 1 z 1

 
Skocz do:  
Możesz pisać nowe tematy
Możesz odpowiadać w tematach
Nie możesz zmieniać swoich postów
Nie możesz usuwać swoich postów
Nie możesz głosować w ankietach

Cobalt 2.0 phpBB theme/template by Jakob Persson.
Copyright © 2002-2004 Jakob Persson


fora.pl - załóż własne forum dyskusyjne za darmo
Powered by phpBB © 2001, 2002 phpBB Group