English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4238022      Online Users : 446
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/4635


    Title: 網路安全威脅分析與防制策略
    Other Titles: Network Security Analysis and Defense Strategies
    Authors: 蘇俊維
    Su, Chiin-Wei
    Contributors: 呂芳懌
    Leu, Fang-Yie
    東海大學資訊工程學系碩士在職專班
    Keywords: 網路安全;網路管理;入侵偵測
    Network security;Network management;Intrusion detection
    Date: 2003
    Issue Date: 2011-05-19T06:28:21Z (UTC)
    Abstract: 在建構安全的網路系統上,一般的入侵偵測僅著重在網路的異常行為分析,如要提昇網路的安全層級,還應該針對網路的各種攻擊方式,做全面性的分析與防制,並訂定出合適的網路存取機制與監控方法。本論文首先探討入侵者如何利用網路的特性,擷取傳輸封包與竊聽密碼,與如何利用不當的存取控制,取得控管權限與系統資訊等。其次,研究入侵者如何利用不被監控的網路封包與不易檢測的隱藏通道建立後門、種植木馬,竊取系統資訊,與如何利用TCP/IP通訊協定的疏漏,經由IP封包欺騙或TCP序號猜測,劫持TCP連線以入侵系統。接著分析入侵者如何利用人為管理疏失與系統設定上的漏洞,取得系統帳號/密碼與使用權限,並探討入侵者如何利用Windows、Unix系統現有的安全漏洞,竊取或破壞系統資源;之後研究入侵者如何利用不易被察覺的偵測技術,掃瞄網路缺陷及漏洞,擷取網路設施的資訊,最後探討網路入侵步驟與入侵趨勢,並提供網管人員制訂安全管理機制時的準則以及防制措施,使入侵攻擊與資訊竊取的困難度提昇,以有效提昇組織內部的網路安全。
    An Intrusion detection system (IDS) generally focuses on the analysis and detection of network anomalies. In fact, all the messages that might threaten a network system and the behaviors of improper network accesses are those should be analyzed when one tries to detect network attacks. In order to improve security degree of a network, we should analyze all kinds of network threats and establish a proper access and monitoring mechanism. In this paper, we first study how intruders gather network packets or obtain illegal access authority by hacking network drawbacks. Second, we discuss how intruders use rarely monitored packets and tunnel to build backdoors for stealing information from information systems, and the way they perform connection hijacking by using spoofing IP and TCP sequence number surmise. Third, how intruders obtain system accounts through security weakness of an operation system is stated. Forth, we describe how hackers make use of undetectable methods to scan network systems to avoid detection by some security mechanism. Finally, we study intrusion procedures and trends, and provide suggestions for network administrator to set up a safer network environment. The purposes are to increase the difficulties of intrusion and illegal accesses to network facilities so as network security can be dramatically improved.
    Appears in Collections:[資訊工程學系碩士在職專班] 碩士論文

    Files in This Item:

    File SizeFormat
    091THU00392004-001.pdf1278KbAdobe PDF946View/Open


    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback