Dissertation > Excellent graduate degree dissertation topics show

Research of Host-based Security Communication in Inner Network Based on Winsock2 SPI

Author: FanCaiXia
Tutor: ZhouLiHua
School: Xi'an University of Electronic Science and Technology
Course: Computer System Architecture
Keywords: Winsock2 SPI Package inception Inner network security Encryption
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 83
Quote: 3
Read: Download Dissertation

Abstract


With more and more insecurity behavior which cannot be solved well by the traditional fire wall technology in inner network, this paper investigate the current status of the inner network at first, after analyzing the main problems of the inner network security, according to my reference, there are many schemes for the solution of the inner network security, after analyzing all kinds of technologies of the package interception that each has its own advantages and disadvantages. A new encryption communication scheme based on the package interception technology of Winsock2 SPI in inner network is presented in this paper with the demand of the fact: After using the package interception technology of SPI, use the access control rules to complete the filtration of the package, and then use the DES arithmetic to accomplish the encryption of it. So this scheme has accomplished the secure communication of inner network combining with the access control technology.There are three aspects mainly in this paper: first it uses Winsock2 SPI package interception technology to accomplish the design without any modification of the upper application program. Second it proposes the technology approach of the secure communication of the host computer which concretely using process、IP address、socket port、special keyword in package and encryption of the package to complete the secure data transmission based on the access control of the host computer. Third it accomplishes a new data encryption transmission model which is different from the usual system which encrypts the data before using the Winsock to send and decrypt the data after receives. So the system can transfer data packets in security without changing the condition of the communication system and solve the insecurity hidden trouble in the intranet communication. It is an all-purpose system which is more flexible and proved to be valuable to strengthen the intranet host computer communication security.

Related Dissertations

  1. Design and Implementation of Windows Kernel-mode Cryptographic Service Interface,TP309.7
  2. Research on Transparent Security of JPEG Image,TP391.41
  3. Design of AHB Monitor Based on SHA and AES Algorithms,TP309.7
  4. Design and Implement of Frequency EOC System and Research of Its Security Mechanism,TN915.02
  5. Identity-Based Authentication System Research and Implementation,TN918.1
  6. Disc authorized to play content encryption algorithm,TP309.7
  7. Fragmentation of data security storage system applied research,TP309
  8. UDT -based real-time streaming media encryption transmission technology research,TN918.4
  9. Scalable video coding H.264/SVC layered encryption scheme,TN919.81
  10. Traitor Tracing and Revocation Mechanisms with Privacy Preserving,TN918.1
  11. The Study on the UAV Digital Remote Sensing & Survey System Integration and Images Data Processing,P237
  12. Network worm defense research,TP393.08
  13. The Research of Rijndael Algorithm for Document Encryption,TP309.7
  14. To prevent internal leakage of information application technology research,TP393.08
  15. The Research of Image Encryption Technique Based on Chaos Series and RSA Algorithm,TP309.7
  16. Digital Image Watermark Technology Research Based on DCT Domain,TP309.7
  17. Research on Image Encryption Scheme Based-on Chaotic Algorithm in Video Conference,TP309.7
  18. Research and Design of intelligent building system security policy,TP311.52
  19. Key Technology of Service-Perceptive Traffic Management on Internet,TP393.06
  20. Design of Image Scout Sensor for Three-dimentional Monitoring in Battlefield,TN919.8
  21. Analysis and New Designs of Digital Chaotic Cryptosystem,TN918.1

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile