Font Size: a A A

Constructing A Gap Architecture Of High Performance

Posted on:2003-04-12Degree:DoctorType:Dissertation
Country:ChinaCandidate:S P TangFull Text:PDF
GTID:1118360065460780Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Among all kinds of network defensive architectures,Network Gap technology has a strong security. In traditional way,we always lose performance of communication when implementing the Gap technology as it does its work at the application layer. To alleviate the influence,we should have a reasonable Gap architecture to disconnect the Intranet from the outside. It' s very important to improve the performance of this Gap achitecture,that is,the responding and security performance.As a kind of proxying technology,how to control links maintained across the Gap architecture is very important. The traditional way just relays on the idle duration of the links,passing by the context information of them. This model works badly in fact. So using a probability method,we give a controlling model of the links across a Gap device that takes the history information of those links into account. To make the model respond more timely,we optimized the model with the cache port pre-reserving and probability link closing method to reduce the CPU consumption.At the same time,for administating proposal,we must outsource the key management service afforded by PKI when use the Gap. The traditional certificate verfication method is very complicated and inefficient. To avoid PKI further tampering with the performance of Gap achitecture,we propose a new paradigm of creating a trust link in any kinds of PKI architecture by an algebraic method. In this paradigm,a separate server caculates the trust matrix for the PKI it located in,and distributes it to all the leaf CAs of the archi UTUHV. When verifying a cert i I'irate,all the user needs to do is just checking the trusty matrix.What we should emphasize here is to improve the security performance of the Gap architecture. When implementing the access controlling service,it is very essential to authenticate peers rapidly and correctly. Hence an authentication system named TSP authentication system is designed to implement the authentication service effetively and accurately. When coupling with the TSP authentication system,the Gap architecture can enhance its security furthermore.
Keywords/Search Tags:Firewall, Network Gapping, Application Proxy, Public Key Infrastructure(PKI), Certificate Authority, Trust Links, Authentication, Trusty Service Protocol(TSP)
PDF Full Text Request
Related items