Multi-layer Defense Architecture Combined with Tracking System and Defense-in-Depth Flow Control System

碩士 === 南台科技大學 === 資訊傳播系 === 97 === Due to the rapid growth of the Internet, in addition to the prosperity of the e-commerce, people are now visioning a beautiful picture of business opportunities brought by the Internet. However, the risk of potential network threats and hacking are in existence whi...

Full description

Bibliographic Details
Main Authors: Ming-Chih Tsai, 蔡明志
Other Authors: Her-Tyan Yeh
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/09130377994482388486
Description
Summary:碩士 === 南台科技大學 === 資訊傳播系 === 97 === Due to the rapid growth of the Internet, in addition to the prosperity of the e-commerce, people are now visioning a beautiful picture of business opportunities brought by the Internet. However, the risk of potential network threats and hacking are in existence while people are heavily relying on the convenience brought by information technology. Attacks from hackers, Trojan, worms, and viruses have been interrupting a lot of buyers from trading with and accessing sites such as Amazon, Yahoo, CNN, E*Trade, EBay and Buy.com suffered by the DoS / DDoS attacks, resulting in the suspension of the general user's services and other business transactions. Nevertheless, there is no such standalone network security mechanism can effectively protect users from the complicated Internet environment and advance hackers’ attack. The only way to strengthen the protection is to simultaneously using many different defensive mechanisms. Therefore, the very first focus of this paper is to make you understand the most commonly used network attacks and threats, and while researching into several protective measures against those attacks, we then formulate into a multi-layer defensive mechanism. Thus an administrator can swiftly handle any surprises, protect its server, and vastly reduce the damage. In the study of McAfee Total Protection and Neo Trace Pro, the use of combining two software into a protection system structure and to prove the possibility and its anti-hacking ability. In the end, the result of the simulation experiment proved that the N-tier does work very effectively, and it is just what we have expected.