Font Size: a A A

The Network Credibility Evaluation Based On Switch Configuration

Posted on:2015-06-12Degree:MasterType:Thesis
Country:ChinaCandidate:D H ZhouFull Text:PDF
GTID:2298330452953223Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of Internet, the characteristics of network renderingcomplex, heterogeneous, diverse, so that the network security issues becomeincreasingly prominent, at present, untrusted network presents new challenges tonetwork security. The credible connotation of trusted network include serviceproviders, end-users and network transmission of information, along with a widerange of LAN applications, network switches becomes critical equipment to achievedata forwarding of network, because the network administrator needs to configure theswitch to achieve the corresponding functions, and different functions will affect theperformance, availability and reliability of data forwarding of network, so due toincorrect configuration or maliciously modify the configuration will make thenetwork changes its operating mode, causing the network work as unexpected,leaving the network to become uncredible. Based on the above untrusted networkproblem, puting forward a method of assessing the credibility of the network formedby the switch.Based on research on the issue of credibility of network informationtransmission, the paper studies functional principle of switches, and studied therelationship between the function and configuration commands, on the basis of theanalysis of the characteristics and the state of behavior of network switches, therebydetermining described manner of the network configuration and the state of networkswitches, the credibility of the evaluation framework proposed by the network switchconsists of a network, the framework considers the content of configure of networkswitches as the data source, and get network status through data processing, and toassess the credibility of the state of the network through a expected trusted network,further assess the credibility of configure the behavior through the transformationrelationship between the network status and configuration behavior, in order toachieve credibility assessment of the network. This article will expand on the contentof the trusted network to the trusted network equipment to ensure the credibility ofuser requirements for running the network device itself.
Keywords/Search Tags:trusted network, credible assessment, conduct credible, credibleassessment framework
PDF Full Text Request
Related items