Font Size: a A A

Implementation Of TSP Tunnel Broker And Research Of Security Enhancement Technology

Posted on:2015-06-10Degree:MasterType:Thesis
Country:ChinaCandidate:C XuFull Text:PDF
GTID:2298330422991937Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet, the shortcomings of the IPv4protocol are increasingly exposed,its address is made up of32bits,all of theseaddress can not meet the required growth of the network nodes,and in the respects ofsafety and mobility it exists congenital defects, so we design the IPv6protocol,itsaddress has128bits.It uses an encryption protocol to ensure the security and itbehaives well in the respect of mobility.The IPv6protocol is compatible with theexisting protocols of other layers,so the development of the IPv6is inevitable. Asthe existing IPv4protocol has been widely used, IPv6is not compatible with theIPv4protocol,so it will appear coexistence of IPv4and IPv6for a long time.Intransition period,the most importment study issues is how to achieve interoperabilitybetween IPv4network and IPv6network.In the three classes of transitiontechnology,that is Dual Stack Technology,Tunnel Technology and Network AddressTranslation Technology, tunnel technology is transparent, cheap and flexible,but it isvery complex in tunnel configuration, and because of this,the development of thetunnel technology has been seriously restricted.So,we begin to study the tunnelbroker to automatic configure tunnel.This paper first deeply describes the purpose and significance of the transitiontechnology in the transition period and the case of study in this period. We focus onthe status of tunnel technology and something about the tunnel safety.Then wereviewed the the principle and the work mode of the three technology,mainly tocompare and analyse the three techniques performance and benefits.Nextly wedetails the tunnel technology and the tunnel broker technology to prove the reasonthat why this paper studies the tunnel broker.The use of tunnel broker makes somenetwork security problems,what’s more,the safety monitoring system can’t filterthe flow on the tunnel,so it may cause various forms of external attacks.The tunnelbroker has some flaws itself and illegal users can exploit these flaws to make attacksto the tunnel broker model nodes. This paper focuses on the security flaws of thetunnel broker and gives some technical solutions to enhance its security.Then wedesign and implement a tunnel broker system based on the TSP protocol,describes indetail of the TSP protocol and the server node of the tunnel broker, how to build theoverall model of the tunnel broker and does the functional tests.We deeply analyse the process of the information exchange in the process of the use of the tunnelbroker,then we add the content filtering module to make some new tests. At last weanalyse the result of the tests and review the future performance improvements andfunction expansion about the tunnel broker.
Keywords/Search Tags:Tunnel, Tunnel Broker, Tunner Setup Protocol, Security
PDF Full Text Request
Related items