Font Size: a A A

Network Security Strategy Research Based Distributed Linkage Technology

Posted on:2015-12-08Degree:MasterType:Thesis
Country:ChinaCandidate:J Y YangFull Text:PDF
GTID:2298330467455754Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Currently most of the corporate networks use hierarchical network design, andattack preventions from equipment manufacturers are mostly stand-alonedeployment. This lack of effective authentication between devices and devices andsecurity policy linkage mechanism cannot effectively identify attacks. It will resultin the proliferation of network attacks,and even lead to paralysis aggregation or coredevices, thus cause network interruption, or network quality degrading.This paper studies linkage detection mechanism of joint cross-layer networkbased on based device authentication distributed and then realizes distributeddeployment of distributed attack defense policy and technology. It focuses on theanalysis and elaboration about technical principles of equipment authentication andjoint technology of security policy, and gives an effective security linkagetechnology deployment programs about anti-cyber attack.The main results of this study are as follows:(1) Propose a distributed linkage security policy which extends traditionalEthernet switch software. It increases the "configuration module","authenticationmodule","client policy distribution and dynamic adjustment module","dynamicdetection module" for the Commander/Relay roles; modifies management moduleAAA/Radius modules, alarm&management module of the original switch.(2) Design security device authentication which refers to MAC authenticationand password authentication, detailing the Certification Process which is betweenClient and Commander/Relay, between Commander and Relay.(3) Design distribution, dynamic adjustment and detection mechanism ofdistributed linkage security policy, and do one little expansion of packets.
Keywords/Search Tags:network security, distributed linkage technology, deviceauthentication protocol
PDF Full Text Request
Related items