Font Size: a A A

Application Of Data Transparent Encryption Based On NDIS In Termediate Driver

Posted on:2012-09-10Degree:MasterType:Thesis
Country:ChinaCandidate:L W SunFull Text:PDF
GTID:2178330332492387Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The main topic of this paper is to ensure the normal communication network and resolve the problem of remote file transfer security. The paper designed a system is issues for companies in the hope that their information technology or planning document for internal employees is normal communicate, while for others the documents is encrypted in the business activities. Now has the addition of file system filter driver to achieve transparent encryption and decryption of the file system. Transparent file encryption and decryption system significantly improves the security of the document, but is also apparent shortcomings, the file system level control determines the system is only suitable for small scale local area network use.This system is widely used by personal firewall packet filtering technology to transfer files on the network encryption, encrypted file has been installed for the driver to receive the host to achieve transparent decryption, otherwise the user sees only the cipher text, to ensure the security of the file At the same time, effective internal staff to avoid intentional or not, lead to the possible disclosure of confidential information. System is flexible and is inserted into a user-level control interface, the user can directly through the user interface control layer filter driver, in order to achieve a specific host or a specific segment of the network traffic control.This subject use the NDIS design a network security system ultimately. NDIS specification mainly on account of which seven core-level model in the network layer of the network, second only to the bottom of the underlying physical network card driver driven by the operating system kernel is difficult to circumvent the protection, and it has a very good security. Experimental results confirmed that the system can be user can not perceive the case to initiate a transparent encryption decryption processing is effective to prevent by the network transmission of the information is intercepted crack, significantly improves the network data transmission security, and can effectively relieve internal staff When using the network data transmission of confidential information threats.
Keywords/Search Tags:Network Security, Intermediate Drive, Transparent Encryption and Decryption
PDF Full Text Request
Related items