Font Size: a A A

Research And Implementation Of Connection Management Of TCP Transparent Proxy For Network Isolation System

Posted on:2009-08-26Degree:MasterType:Thesis
Country:ChinaCandidate:M J TanFull Text:PDF
GTID:2178360242999076Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along with the rapid development of the computer network, especially the constant expansion and application of Internet, the security problem of the computer network has been one of the focuses that people all of the world concern. In various network security technologies, firewall technology is the most representative .However, with the in-depth study of firewall technology, people gradually find that the firewall technology has some limitations in high-security area. Network isolation emerged as times require.Since network isolation technology being used, how to exchange the information after being isolated has been the key to improve the available technology. At present, the high-speed network technology is developing rapidly, which makes a higher demand on how to efficiently carry out various network applications with network isolation technology, such as the safe exchange of inside and outside net datum, transparent support applications and so on.This thesis on the basis of studying and comparing the structural model of firewall systems and isolation system, designed a TCP transparent proxy two entities structure model for network isolation system. The model has three major components: the transparent proxy connection management, transparent proxy data management and private exchange protocol. This article gives a detailed description on the critical technology of connection management, including packet redirect, packet address translation, and collection map table, and then implemented a prototype for our desgn.Finally, according to the result of testing and analyzing the prototype test cases, the TCP transparent proxy model has been proved to be feasible and correct. And the test showed that the model has a good performance as well.
Keywords/Search Tags:Network Isolation System, Firewall System, TCP proxy, TCP transparent proxy
PDF Full Text Request
Related items