Font Size: a A A

Research On And Implementation Of The Security Environment Of The Security Router With IPSec

Posted on:2005-07-20Degree:MasterType:Thesis
Country:ChinaCandidate:Q LiFull Text:PDF
GTID:2168360122493309Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Research on and Implementation of the security environment of the Security Router with IPSecLi Qing(Computer Applied Technology) Directed by Cheng WeimingIn recent years, Internet has been experiencing rapidly growth and infiltrating into many aspects of person and society. More and more information have been transported via Internet, including a large amount of sensitive and confidential information. The infrastructure of Internet, however, has many security hidden troubles. IPSec has been proposed as the security protocol of the IP network, to provide IP security.The Router with IPSec is meant to provide security communication on the basis of the IPSec implementation. To eliminate the hidden trouble existing in the Security Router and the service it provides, the paper demonstrates a building for the security environment of the Router on the basis of comparing the state-of-the-art, which can protect the Router providing security service.The security environment of the Router with IPSec is provided by the cooperation of access control system, key management system, audit system, security service strategy system, intelligent diagnosis system and IPSec implementation. The paper will deliberately introduce the research and implementation of these systems. Besides, the paper proposes a Hierarchy RBAC Model Based on Separation of Duties to solve the difficulty of altering the roles in Hierarchy RBAC Model.The paper is organized as this: The first chapter introduces system security and the Security Router with IPSec; The second chapter introduces the security architecture of the Security Router system; The third chapter introduces the access control system of the Security Router; The fourth chapter introduces the key management system of the Security Router; The fifth chapter introduces the audit system of the Security Router; The sixth chapter introduces the security service strategy system of the Security Router; The seventh chapter introduces the intelligent diagnosis system of the Security Router; The eighth chapter gives a conclusion and indicts the future directions of the system.
Keywords/Search Tags:Security, IPSec, Router, Access Control, Audit
PDF Full Text Request
Related items