Font Size: a A A

Implementation Of Network Virtualization Based On Sandbox Technology

Posted on:2013-07-02Degree:MasterType:Thesis
Country:ChinaCandidate:X WuFull Text:PDF
GTID:2248330392456893Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the gradual promotion of persocial web, e-government&e-commerce, complexnetwork environment and explosive growth of the amount of information virtually give aserious challenge to the internal network security.In the interal network, people often need to download the resources which contain allkinds of different security classification of documents and sensitive information from thesecurity domain. The sensitive information is often lack of effective manage and mixedstored in the user’s computer. It is not conducive to the data classification storage andconfidentiality; it can also add potential risk to interal network information confidential.Potential security vulnerabilities of network protocol also add trouble to secure networkcommunications.To solve the above problems, we present an idea which interal network secureterminal based sandbox technology. With the isolation characteristics of thesandbox, wecould construct a virtual environment to access network resources. With virtual NetworkInterface Card and transparent file system encryption technology, we could achieveend-to-end secure transmission of information and the classification storage of sensitiveinformation. We focused on the network virtualization exploration.We use the virtualNetwork Interface Card encrypted tunnel to ensure securenetwork communications; itallows user access to internal resources through direct access or remote access security.Combined with Unified-authentication technology, our systems provide a unified-authentication and communication key management for internal users. To strengthen theunified management on the internal network, users are allocated for user communicationsession keys.According to the Secure Sockets Layer&Open Virtual Private Networkcommunication protocol, we customize the communicate protocol for the systemt toimprove the security of the user terminal to access internal network resources.Finally, across the design and implementation of the program and the overall test, wepropose some improvements about system performance.
Keywords/Search Tags:Sandbox Technology, Virtual Network Interface Card, Unified-authentication, SSL protocol, Internal Network Security
PDF Full Text Request
Related items