Font Size: a A A

Research And Implementation Of VPN Technology Face To Classified Protection

Posted on:2009-07-08Degree:MasterType:Thesis
Country:ChinaCandidate:W HeFull Text:PDF
GTID:2178360278480815Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Classified Protection is regarded as the hotspot in the field of information security and is largely researched. Mandatory Access control and security-label are two important security requirements of information system Class3 in Classified Protection and on the important degree. With the respect to the various operation system and official system in Classified Protection information system, to fulfill the security target of information system Class3 via VPN is an effective method.To resolve the security problems in Classified Protection ,this article described a VPN system facing to Classified Protection information system. This VPN system can fulfill the security requirements of information system Class3 in Classified Protection while maintaining the original operation system and official system of the information system, and this VPN system also provides the interoperability and expansibility of the system. The main work of this paper is as follows:1. This paper researcher the criteria and research productions of Classified Protection, contrasted the security requirements of information system Class2 and Class3, proposed the security requirements of VPN system facing to Classified Protection and the key technology.2. Based on the research of MAC technology, this paper proposed a MAC model to fulfill the security requirement of information system Class3 in Classified Protection, and described its implementation in VPN system.3. After studying the long-distance access control technology in distributing networks, aiming at the security of information system Class3, this paper proposed a protocol for Multi-Levels Intercommunication .This protocol based on the conversion of security labels, can achieve the security criteria of the multi information systems intercommunication in Classified Protection.4. This article described the implementation of the VPN prototype system ,which giving emphasis to the implementation of MAC model.
Keywords/Search Tags:Classified Protection, VPN, Security Label, MAC, Multi-Levels Intercommunication
PDF Full Text Request
Related items