安徽国防科技职业学院
毕业(设计)论文
论文题目
计算机网络安全分析与防范研究
姓 名 专业班级 指导老师 完成时间
摘要
摘要:
近几年来,Internet技术日趋成熟,已经开始了从以提供和保证网络联通性为主要目标的第一代Internet技术向以提供网络数据信息服务为特征的第二代Internet技术的过渡。与此同时,数以万计的商业公司、政府机构在多年的犹豫、观望之后,意识到采用Internet技 术并使企业数据通信网络成为Internet的延伸已成为发展趋势。这使得企业数据网络正迅速地从以封闭型的专线、专网为特征的第二代技术转向以 Internet互联技术为基础的第三代企业信息网络。
所有这些,都促使了计算机网络互联技术迅速的大规模使用。众所周知,作为全球使用范围最大的信息网,Internet自身协议的开放性极大地方便了各种计算机连网,拓宽了共享资源。但是,由于在早期网络协议设计上对安全问题的忽视,以及在管理和使用 上的无政府状态,逐渐使Internet自身安全受到严重威胁,与它有关的安全事故屡有发生。对网络安全的威胁主要表现在:非授权访问,冒充合法用户,破坏数据完整性,干扰系统正常运行,利用网络传播病毒,线路窃听等方面。这以要求我们与Internet互连所带来的安全性问题予以足够重视。
关键词:网 络、安全、VPN、加密技术、防火墙技术
i
ABSTRACT
Abstract:
In recent years, the Internet technology matures, has begun to provide and ensure network from the main target mergence league for the first generation of Internet technology to provide information service for the characteristics of network data of the second generation of Internet technology transfer. Meanwhile, tens of thousands of businesses, government agencies in the years after watching the hesitation, using the Internet technology, the aware and make the enterprise data communications network as the Internet has become the development trend of extension. This makes the enterprise data network is rapidly from the line, with closed for the second generation of the special network technology to Internet based on Internet technique of the third generation of enterprise information network.
All these are prompted the computer network technology of large-scale interconnected. Fast As is known to all, as the largest global use Internet information network, the openness of the great place their agreement show various computer networking, broaden the sharing of resources. However, due to the early design on the network protocol, and the safety problems in management and ignore the anarchy, use the Internet itself gradually that threatens the safety, and its relevant safety accidents occurred. The network security threats mainly displays in: unauthorized access, pretend to be legitimate users, data integrity, interference system, using the normal operation of network transmission lines tapped, etc. It requires us to interconnect with Internet brings safety problems should pay enough attention.
Keywords: nets collaterals, safety, VPN, encryption, firewall technology
ii
目录
第1章 网络的威胁分析 ............................................... 1 1.1. 网络受到威胁的主要原因 ....................................... 1 1.2 当前网络的现状 ................................................ 4 第2章 攻击 ........................................................ 4 2.1 攻击的分类: .................................................. 4 2.2 黑客攻击网络的常用手段和工具 .................................. 5 第3章 介绍主要的网络安全技术 ...................................... 8 3.1 访问控制技术 .................................................. 8 3.2. 网络入侵系统与安全漏洞扫描 ................................... 9 3.4. 身份认证技术 ................................................ 11 3.5 认证中心 ..................................................... 12 3.6 采用多层次多级别的企业级的防病毒系统 ......................... 13 3.7 备份和容灾技术 ............................................... 13 3.8 安全的审计 ................................................... 15 第4章.搭建家庭用户的多层次网络安全环境
15
4.1 对于家庭网络安全需求,我们主要考虑因素: ..................... 15 4.2 综述安全管理框架 ............................................. 15 4.3 家庭网络的安全技术 ........................................... 16 4.4 设计方案 ..................................................... 17 4.5 家庭网络图: ................................................. 17 结论 ............................................................... 18 参考文献 ........................................................... 18
i