Font Size: a A A

Design And Implementation Of Security Gateway Based On The Identification Function Of File Form And Contents

Posted on:2016-06-25Degree:MasterType:Thesis
Country:ChinaCandidate:C JinFull Text:PDF
GTID:2308330473450061Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the improvement of information technology, the computer and network technology have improved the efficiency of people’s daily work, and has made things convenient for the people. But the network security, information security has become a problem in the enterprises and institutions. According to the statistics, a lot of security incidents by Intranet users (Internal staff) who have intentionally or unintentionally operated. The R & D datas of high-tech company were often leaked by internal staff. To protect the R & D datas, some enterprises or units have separated the inner and outer network. But the data is always to use from one to another, there is no absolutely security in the world.The technical data in the virtualization environment was safety The data will be used in the other environment. The common Security Device can not indentify the sensitive data from the output data. The internal developers can use the opportunity to carry the sensitive data out. To solve the Information Security problems in the R & D process of high-tech company, the author has designed a Secure Gateway that can intelligently identify the forms and contents of technical files which was exported from the R&D environment. The author research the technology of indentification of the file form and contents. And the author also study the method to increase the execution efficiency of the Security Gateway. Through the research and practice, this topic has been primary succeed.The Security Gateway using the existing characteristics can indentify the form and contents of the output data file. If the contents and form match the existing characteristics,the Secruity Gateway will block the transmission and record to log.The Security Gateway has prevent these sensitive datas output.Continued supplying the data form and content characteristics, the Security Gateway will be continued to enhance the values,and it is worth to be used widely to other high-tech companies. The author cooperate with security products manufacturer for subsequent development.According to the performance requirements are different, the Secruity Gateway can be customized for different price positioning products. It will form a rich product line.
Keywords/Search Tags:Information Security, Security Gateway, identication of the file form, identication of the file contents, Virtualization
PDF Full Text Request
Related items