Font Size: a A A

The Design And Implementation Of Access-control System Based On Transparent Proxy

Posted on:2007-03-07Degree:MasterType:Thesis
Country:ChinaCandidate:P ZhuFull Text:PDF
GTID:2178360212958521Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In an age of information, the development of computer Internet and improvement of technology gradually enhance the importance of Internet security. Firewall, as a compulsory Internet access control mechanism, is a very important means to ensure Internet security.This thesis introduce the research instance and the development trend of firewall technology, analyzed the operating principle of Netfilter/Iptables. Focusing on the system environment of Linux, this article gives a detailed analysis of the principles and means of realization of transparent proxy, studies the ways of data packages capture , data package capture and institution of iptables filter rules in transparent proxy. Based on the researches and analyses of access control techniques, this thesis focuses on the access control techniques in the system environment of Linux and puts forward an access control pattern based on transparent proxy. In addition, data capture techniques are applied in access control, and by filtering data packages in iptables, it solves the problem of illegal Internet access acquisition by users who utilize transparent proxy to bypass the firewall after identification.This thesis designs an access control system based on Transparent Proxy, and realized in campua network of AnHui Vocational College of Police Officers. Finally this system is proved to be feasible and can prevent user to bypass the firewall.
Keywords/Search Tags:Firewall, Netfilter/Iptables, Transparent Proxy, Access control
PDF Full Text Request
Related items