Font Size: a A A

Research And Implementation Of Transparent Network Security Technology Based On IP Security

Posted on:2002-01-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y H LiaoFull Text:PDF
GTID:2168360032950960Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The developer must consider the corresponding network security problem when building his/her application system. A transparent network security solution, which is independent of applications, is proposed in this thesis. It frees developers from network security problems and lets them focus on domain developing. Moreover, the transparent security system gives new life to some application systems that were built without security considerations. The concept introduced in this paper helps to resolve network security problems independently and creates an enterprise level security policy. Because of the dependence between the high level protocols and applications, the transparent network security mechanism should be implemented on the IP layer. With the combination of encryption, authentication and IP filter technology, this thesis establishes a transparent network security scheme on the IPV4 (compatible with IPV6) according to IPSEC (RFC24O 1, RFC2402, RFC2406, RFC2408), and achieves host to host secure communication on the internet or intranet. The thesis comprises of three main sections. The first section (Charter 1,2) introduces the theoretical basis and algorithms. The second one (Charter 3,4) presents a schema of IP security system and the outline of the techniques that put the schema into a real system in the Windows Kernel Mode. The third one (Charter 5,6) discusses the software design and programming.
Keywords/Search Tags:IP Encryption & Authentication, Transparent Network Security, IP Security, IDEA, ISAKMP/Oakley, Diffie-Hellman, NDIS Intermediate Driver, Windows Kemel Mode, WDM
PDF Full Text Request
Related items