You are here: hacking technology > invades the examination > Content
Hot Articles
Recommend Articles
New Articles
The network invasion examination system (IDS) chats
  Add date: 07/19/2008   Publishing date: 07/19/2008   Hits: 52
Total 5 pages, Current page:1, Jump to page:
 
Enhances unceasingly along with the network security risk coefficient, once took the most main safe guard method the firewall, already could not satisfy the people to the network security demand.

Takes to the firewall and the beneficial supplement, IDS (invasion examination system) can help the network system fast discovery network attack the occurrence, expanded system manager's safety control ability (including safe audit, surveillance, attack recognition and response), enhanced the information security foundation structure integrity.

After IDS is considered is firewall's second security strobe, it can, in does not affect the network performance in the situation to carry on the monitor to the network, thus provides to the internal attack, the exterior attack and misoperation's real-time protection.

Is following the computer network technology and Internet's swift development, the network attack and the invasion event grows day by day, specially in the recent two years, the Government department, the military establishment, the financial organ, enterprise's computer network frequency suffers the hacker to attack. The aggressor may not have the safekeeping of security network to these to carry on the attack and the invasion calmly, like carries on refuses to serve the attack, to be engaged in non-authorized the visit, to steal recklessly with the distortion important data message, installs the back door monitor procedure in order to momentarily obtain the insider information, the dissemination computer virus, to destroy main engine and so on. The attack and the invasion event have brought the huge economic loss and the image harm for these organizations and the enterprise, even immediate danger country security.

First, existence question

Why can the aggressor carry on the attack and the invasion to the network? The reason lies, in our computer network exists may the security weakness which, the crack as well as the unsafe disposition uses for the aggressor, mainly displays in the operating system, the network service, the TCP/IP agreement, the application procedure (for example database, browser and so on), the network equipment and so on several aspects. Is precisely these weakness, the crack and the unsafe establishment gives the aggressor by the opportunity to be exploited. Moreover, because the majority of networks lack the early warning protection mechanism, even if the aggressor already invaded the internal network, invades the key the main engine, and is engaged in the illegal operation, our network management personnel are also very difficult to realize. Thus, the aggressor has anything which the enough time is them to want to do.

Then, how do we prevent and avoid suffering the attack and the invasion? Must first discover the security weakness which, the crack and the unsafe disposition in the network exists; Then uses the corresponding measures to stop up these weakness, the crack, carries on the revision to the unsafe disposition, maximum limit avoids suffering the attack and the invasion; At the same time, carries on the real-time monitor to the network activity, once monitors the aggressive behavior or the contrary operation, can make the response promptly, including the record diary, the warning even blocks the illegal connection.

 
Other pages: : 1 * 2 * 3 * 4 * 5 * Next>>
Prev:Ten big invasion examination system high risk event and countermeasure Next:Invasion examination technology: The network security third strength

Comment:

Category: Home > invades the examination