Font Size: a A A

Research On Network Security Isolation GAP Technology

Posted on:2010-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:J M YaoFull Text:PDF
GTID:2178360278496965Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Problem of computer security is almost birth with computer. Especially when the Internet is booming throughout the world, this problem is becoming more an more important. Face to all kinds of problems of network security and more advanced tech- nologies of information proposed the requirement of a higher level security degreee. The Network Isolation technology, which originated from Israel and American, sat- isfied this requirement to some degree.Isolated GAP technology is a kind of new network security product which is dev- eloped recent years, it can provide a huge fissure between the untrustworthy network and trustworthy network, the thchnologies used in GAP are included as follows: prot- ocol transforming, cipher technology, IDS, filter of virus and keywor, and so on.Base on the current situation, this thesis study the principle of Network Security and its key technologies, and the way to realize them. GAP consists of internal proc- essing unit, isolation hardware and external processing unit. Its core isolation hard employs the technique of twin channel real-time switch with buffers, using this tech- nique we can efficiently improve exchange velocity and can meet Applying need of the system.This thesis analyzes the limitation of the current realization, and then it brings fo- rward an improved implementation on the GAP, which is base on the limitation of the current technique of the hardware and the application. The implementation schemes of the improved security GAP avoid the useability of hardware and the restriction of the life span, improve the expandability and save the costs. In fact, the physical isola- tion module is an independent system which employs the kernel of Embedded Linux Operation System, including storage medium and switching control. Most of the artic- le introduce the flow of work of the improved physical module.Moreover, imploying the modularization ideas are able to simultaneously support multiple application protocols by increasing analysis module and realize the high exp- andability of the system.
Keywords/Search Tags:network, security, physical isolation, GAP, switching control, protocol analysis
PDF Full Text Request
Related items