Font Size: a A A

The Research And Simulation Of Intranet Security Architecture Models

Posted on:2007-09-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2178360182482178Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Intranet is an enterprise internal network built using the related technologies of Internet. Intranet is an application extension of Internet in the enterprise information systems. Because of preserving many secret information, Intranet has to face with the high security risks. In order to protect the confidentiality of the information, preserve the integrity of the data, resistant the computer viruses and protect the equipment, it is need to integrated the network security technologies ,and establish an effective security system.This paper has introduced the concepts and the status of Intranet security, discussed the network security technology system, and emphasize is laid on the most popular security technologies such as firewalls technology, anti-virus technology, IDS technology and encryption technology. And then , this paper has introduced the international generic norms IATF which is based on how to establish an effective security system ,We apply the IATF's ISSE methodology and practical experience to propose an Intranet security model which can achieve the security by physical layer, link layer, network layer, system layer and data layer . Next, this paper designs a feasible deployment program and describes some network security system management technologies. Finally, we make simulation experiments for the proposed model using OPNET Modeler.The innovation of this work is in use of ISSE methodology which is a part of IATF, the international generic norm concerns how to establish an effective security system, to propose a multi-layers Intranet security model, and introduce the network simulation to the ISSE to be a tool of security evaluation.This paper has 7 chapters as follows.Chapter 1 introduces the Intranet security, this paper's research goal and works.Chapter 2 introduces the Intranet security technologies.Chapter 3 gives an Intranet security model, discuss how to make use of security technology to composite an strong security system.Chapter 4 discusses how to deployment the Intranet security system in theinternal and external of Intranet.Chapter 5 discusses the management of the Intranet security system.Chapter 6 uses the OPNET to simulation network attack process to get the parameters such as network load, the packet flow, and so on.Chapter 7 gives conclusion and outlook.This paper is supported by National Natural Science Foundation of China(90304018)...
Keywords/Search Tags:Intranet, security system, IATF, Security mechanisms, OPNET Modeler
PDF Full Text Request
Related items