Dissertation > Excellent graduate degree dissertation topics show

Network collaborative intrusion response fast recovery technology research and independent accident

Author: LiZhongHua
Tutor: LiWeiHua
School: Northwestern Polytechnical University
Course: Applied Computer Technology
Keywords: Network Intrusion Cooperative Intrusion Response Quick Data Recovery Autonomous Disaster Management Multi-Source Transmission Remote Data Synchronization
CLC: TP393.08
Type: PhD thesis
Year: 2006
Downloads: 339
Quote: 0
Read: Download Dissertation


With rapid expansion of Internet, the applications based on network are more and more widespread. Hacker’s attack methods also become diversified. Incident of network becomes large-scaled one and threats the global network. Loss caused by incident is getting huger and huger. Therefore, this thesis studies the technology of cooperative intrusion response and quick autonomous recovery of disaster. A multi-level defensive system is developed, which can cooperate with the others and quickly response to large-scale intrusion. A disaster tolerance system is established in the thesis to realize quick autonomous recovery of important data. A low-cost, high-reliability disaster tolerance plan is proposed, which can be adopted widely.This thesis is supported by two National High Technology Development 863 Program of China under Grant No. 2003AA142060 and 2001AA142100. One is the Study on Integrated Network Security Technology; the other is the Study on Hacker Monitoring Technology.The main work and the innovation of the study are as follows.1. A cooperative intrusion response model is presented. The defensive strategy of global defense is used to prevent widespread intrusion in large-scale network. In the system, all defensive components work interactively and adopt dynamical defensive strategies. The incident can be audited timely, early-warned, identified and responded quickly. Loss can be minimized.2. A model of quick autonomous recovery of disaster is presented. By monitoring crucial data file, the system can automatically update the replicas or restore the data. The model provides security, correctness, availability of crucial data. Replicas can be stored reliably in normal storage device of remote network based on this model.3. A Linear Error Correction Code (LECC) algorithm is presented to resolve low-speed and low-reliability flaw problem in data transmission of backup and recovery. LECC divides crucial data file into pieces for encoding and send the encoding pieces over erasure channel (such as the Internet). The decoder can recover

Related Dissertations

  1. RFID applications for the tobacco industry demonstration platform,TP391.44
  2. Petri net -based network intrusion detection system Research and Implementation,TP393.08
  3. Web optimization methods for monitoring of sensitive information,TP393.08
  4. The Research of Intrusion Detection Technology Based on CCSDS AOS Space Network,TN915.08
  5. Design and Implementation of the campus network intrusion detection system,TP393.18
  6. The Research on Intrusion Detection Model on Wavelet Neural Networks,TP393.08
  7. Intrusion Detection System (IDS): Simulation and Analysis of Denial of Service Attacks,TP393.08
  8. Research and Implementation of Intrusion Detection Techniques Based on Double Zero Copy Model for High-Speed Network,TP393.08
  9. Trojan Horse Attacks and a New Type of Trojan Detection Technology,TP309.5
  10. Research of Intrusion Detection Based on Hierarchical Structure in Wireless Sensor Networks,TN915.08
  11. Research on Statistical Detection Methods for Anomaly Network Intrusion Detection,TP393.08
  12. Network Intrusion Detection System Based on Artificial Immune,TP393.08
  13. Build an Immune Network-Based Distributed IDS Model,TP393.08
  14. Quantum Evolutionary Algorithm and Its Application on QoS Multicast Routing and Network Intrusion Detection,TP393.08
  15. Chart-based Intrusion Detection System,TP393.08
  16. Based on multi-core platform Intrusion Detection System Design and Implementation,TP393.08
  17. The Intrusion Detection System Design and Deployment Research for DCN of Service Providers,TP393.08
  18. Oriented data flow partial exception outlier dynamic mining algorithm research and application,TP311.13
  19. Unique network - based research and application of artificial immune model,O242.1
  20. Forecasts and trusted routing method based on information entropy IP network abnormal behavior,TN915.06
  21. IPv6-based combined misuse and anomaly intrusion detection system research and design,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile