Font Size: a A A

Research And Design Of The Interaction With IDS And Firewall Base On The IPv6

Posted on:2009-06-07Degree:MasterType:Thesis
Country:ChinaCandidate:H P ZhangFull Text:PDF
GTID:2178360272455679Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of the Internet, it has embedded into each field in our daily life. At present, as there are so many deficiencies in the IPv4 network, especially the network security capability is not strong. Replacing traditional IPv4 network to IPv6 network would be a necessity process. However, it is not to say that problems such as the security problems in the current network can be solved as the development of the IPv6. This paper is to do research in the security issues base on the IPv6.There is a traditional means to resolve the security problems by using firewall, IDS (Intrusion Detection System), or both of them in the IPv4 network; they usually could protect the network and detect the intrution. But, it does not mean that the use of firewall and IDS could be abandoned. There are drawbacks if apply firewall or IDS respectively. Most of the security interaction products are self-oriented and their communication protocol are developed respectively that the compatibility is bad. The key issue of invasion is that the source of information is still in deficiency.This paper studied the characteristics of the IPv6 protocol technology and the drawbacks, traditional firewall and the IDS, as well as the concepts and principles of firewall and the IDS which based on the design of the core technology. The analysis points out that the present of deficiency by using the two respectively. Then this paper proposes the ideas of firewall and IDS interaction. By analyzing the current interaction technology, we made a conclusion on the interaction of each core technology to put into practice and have undergone analytical research. This paper has also designed an operable firewall under IPv6 circumstances and the cooperative of IDS Model; the interaction structure of the two and the structure of the system. They are then put into practice and after testing, they achieve a better effect interaction of network security defense.
Keywords/Search Tags:IPv6, Firewall, IDS, Interaction, Honeypot
PDF Full Text Request
Related items