Font Size: a A A

Research Of Multi-firewall Based Access Control And Its Applications

Posted on:2009-03-14Degree:MasterType:Thesis
Country:ChinaCandidate:N ChenFull Text:PDF
GTID:2178360272475621Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of network technology and the popularity of network, network security is becoming increasingly prominent, network attacks and illegal access to network increasing. In a large number of cases, the information security and access control system is the first barrier, it does not, the information confidentiality, integrity and availability are difficult to protect. The papers for cross-border visit to the case study on the topic of access control is of great significance.Firewall is the most common kind of access control mechanisms. As a firewall installed in different domains between the access control system [2], went through from the packet filter, application proxy, state Inspection and variety of hybrid firewall, and always works as a technology solutions continue to develop and improve . However, the firewall is still no guarantee that effectively put an end to the internal network users to divulge sensitive information to prevent unauthorized access to confidential data when cross-border accessing.To address these issues, this paper researched the theory and the ways and means of the access control [3], the reference to confidentiality of the Bell-LaPadula model and integrity of the Biba model, put forward a mandatory access control module features. The module is to ensure that the sensitive information not being divulged and data not being modified. illegally.At the same time, this article in full and on the basis of the traditional firewall model, the introduction of mandatory access control links, joined the mandatory access control module of ensureing data confidentiality and integrity to improve the traditional firewall model, proposed multi-layer firewall security reference model. The model is based on the level of protection requirements of the multi-layer firewall settings for different levels of access security domain to protect and improve the internal network and the safety factor. At the end of this article, the author is given based on multi-layer firewall technology cross-domain access control examples. Experiments have proved that technology-based multi-layer firewall security reference model in cross-border visit has achieved the major goals.
Keywords/Search Tags:Firewall technology, Cross-domain access control, Reference model, Multi-level security
PDF Full Text Request
Related items