Font Size: a A A

Research On Key Technology In The VRN Penetrate-defense

Posted on:2013-07-24Degree:MasterType:Thesis
Country:ChinaCandidate:X J XuFull Text:PDF
GTID:2248330377958799Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In now day,the internet has became an important way for people communicating, andmore and more companies and people contract with each other by the internet. Transmittinginformation by the internet is not safe because the internet is shared by people. Theconception called virtual private network (VPN) is proposed to solve this problem. The VPNprovides end-to-end and having certain security and service quality of data communicationservice by connecting public network which is distributed at different locations to logicallyvirtual subnet. VPN ensures the information transmited is confidential, while it also makes theinformation leak conveniently. The intranet users of company enterprise transfer theinformation encrypted to avoid sercurity through the VPN proxy, which is a new threat of thecompany internal information protection. During the period of security audit of the IPSecVPN, some innovation work is carried out as follows:This paper puts forward a realization plan of establishing IPSec channel adaptivetechnology based on a detailed study of the IPSec channel negotiation processing. The planmakes the intermediary cheat client and server into IPSec negotiation and establish IPSecchannel automatically. This paper puts forward a packet I/O solution to solve the intermediarysending and receiving data packets problem without corresponding IP address and make theadaptive channel negotiation become possible.In order to improve the IPSec channel negotiation processing performance of theintermediary, this paper presents a multi user oriented IPSec channel parallel negotiationmechanism, which process IPSec channel negotiation parallelly and make each IPSec channelnegotiation process reach equilibrium by some scheduling algorithm.At last, this paper designs and realizes a VPN penetrate-defense system based on thesetechniques. It illuminates system’s logic framework, the function of eache module and thedata processing flow, and shows the system running effect in the form of pictures.
Keywords/Search Tags:virtual private network, IPSec VPN, penetrate-defense, adaptive technology
PDF Full Text Request
Related items