Dissertation > Excellent graduate degree dissertation topics show

Research and Implemention of IP Packet Reinstall System Based on VPN

Author: MaTeng
Tutor: LuYing
School: Dalian University of Technology
Course: Pattern Recognition and Intelligent Systems
Keywords: Network Security TCP/IP IPSec Protocol Virtual Private Network
CLC: TP393.08
Type: Master's thesis
Year: 2011
Downloads: 4
Quote: 0
Read: Download Dissertation


The application of Internet has led to an ultimate revolution in information technologyfield. By more and more business activities are performed on the internet, informationsecurity becomes to be a key technology for enterprise business activity security. So how toprotect the information security of enterprises business activity is the focus of this work.VPN is use of open data communication network. Because of the security issue was notconcerned in the TCP/IP designing work, many internal faults are hiding in this protocol. Sodata in the IP data packet is easy to modify when it is transmitting on the internet. In order tosolve these security problems, the third level IP security protocol is developed by the IPsecurity protocol working committee, which is founded by IETF, called IPSec.IPSec is supported by many IT enterprises because of the IPSec protocol and IP protocolis using the same technology. But the IPSec protocol is not perfect, there is not uniformstandard about the research of the poor performance for anti-virus and security policy. Whenthe packets pass through the corporate security gateway, the security isn`t strongly protected,The original design schema cannot meet the enterprise application requirement of security andflexibility, so under the IPSec protocol, it is a research point that how to achieve the triplesecurity level authentication for enterprise data file transmitting application.This work is based mainly on IPSec framework, the use of NDIS technology, flexibilityfor enterprise data security certification request triple improvements. In chapter one, thedevelopment background is introduced. The architecture mode is discussed in chapter two, bymeans of which, every component of IPSec protocol stack is summarized. Based on theconclusion in chapter one and two, a new VPN secure gateway design schema is figured outin chapter three. In order to examine the performance of the new VPN gateway, a simulationexperiment is put into practice, the result shows that this design is security and easy to use.With the advantage of low expense, high flexible and usability, this design of securitygateway is prior to the traditional gateway with the improved IPSec VPN security issue. It isof great meaning of this design in the internet enterprise business security field.

Related Dissertations

  1. Research and Application of the Integrated Experimental System for Low-Voltage Power Line Carrier Communication,TM73
  2. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  3. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  4. The Design of Embedded Image Transmission Terminal Based on the TCP/IP Protocol,TP368.1
  5. Region-based wireless sensor network key management scheme for research,TP212.9
  6. SX Provincial Public Security Bureau Network Security Corps Performance Evaluation Index System Design,D631.1
  7. TCDS car ground data communications system designed to achieve integration in 5T,U29-39
  8. E-Government Network Security Analysis and Prevention Strategy,TP393.08
  9. Design of Embedded Ethernet Controller Based on B/S Mode,TP273.5
  10. The Development of Elevator Multimedia System Based on LPC2478,TP368.1
  11. The Research of Insurance Network Marketing of China Insurance Company,F724.6
  12. One based on pattern matching lightweight network intrusion detection system design and implementation,TP393.08
  13. Design and Implementation of PIC-based Embedded Remote Monitoring System,TP277
  14. Analysis on DDoS Attacks Detecting Technology Based on Eigenvector,TP393.08
  15. Harmonious Society under the Network Security Problems and Countermeasures,TP393.08
  16. Network Security Incident Analysis and Implementation Strategies,TP393.08
  17. Research of Campus Network Security System,TP393.08
  18. Research of High-Performance Packet Capture Mechanism in Linux Environment,TP393.08
  19. Plan and Practice of Mobile Network Security Reinforcement Project,TN929.5
  20. Research and Design of Isolation and Monitoring Technology on Government Network,TP393.08
  21. The Research of Network Intrusion Detection Technologybased on RBFNN-HMM,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile