Font Size: a A A

Study Of The Credibility Of The Campus Network

Posted on:2007-05-11Degree:MasterType:Thesis
Country:ChinaCandidate:S Q ZhangFull Text:PDF
GTID:2208360182497630Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
With development of computer and communication's technology,Computer network has become the major means of information exchanging inevery field. The network has become an inseparable part of life. It hastaken to one of the infrastructures of a country. But the network mustcontain safeguards to handle the threats and show its value ofinfrastructure. With the fast development of E-commerce and E-government,the security problems of the network are becoming more and more severewith too many viruses and Hackers. All of these lead to the decline ofthe credibility of the network. Through the study, we learn that to improvethe credibility of the network, the key point we should do is to guaranteethe network users' real identity and their behavioural credibility, andwith all kinds of security technologies and measures used, a trustworthynetwork is set up. Take a campus network as an example, Herein we putforward an overall scheme to set up a safe and trustworthy network.The main work and creativity are expressed as follows:1. Discuss the background and meaning of this study. Analyse thethreats to network with the campus network as an example.2. Relate the concept and structure of trustworthy network;3. Present the Network ID System. Present a trustworthy campusnetwork model. We focus on the design of campus CA system: basedon PKI, using RSA, we programme to realize the CA in campus network,and discuss the use of symmetric key cryptography to transfer datasecretly;4. Discuss the key techniques such as: IDS ,Firewall ,NAT,CA,VPN ,especially the Network ID System. We focus on the NetworkID System's core part, concrete measures, samples and itsadvantages. We preview the problems of Network ID System and comeup with the solutions.5. Based on our campus network, discuss the structure of trustworthycampus network;6. Sum up the whole study.Above all, the paper does some research in the trustworthy networktechnology. And we hope it will promote the development of the technology.
Keywords/Search Tags:network, network security, trustworthy network, Network ID System
PDF Full Text Request
Related items