Font Size: a A A

Design Of Access Control Model Based On Network Convert Communication

Posted on:2016-03-18Degree:MasterType:Thesis
Country:ChinaCandidate:S J WenFull Text:PDF
GTID:2308330479498300Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Network access control mode is an important means of network security guard and protection. The mostly existing network access control model are implemented by encrpytion,which contain defacts and shortcoming and easy to be discovered and attacked.Against of those defects, a network covert communication based access control model(NCC-AC model) is proposed, using hiding method to realize access control. NCC-AC model is consisting of embedding access unit and detection unit of stego-label. Based on detailed description of the design of the stego-label, this paper highlights the functions and design of the stego-label mentioned before. The design of stego-label includes the content and the length of the label, as well as the selection of the digital carrier.In case of the replay attack, the time stamp is included in the label. To enhance the robust of the stego-label, the thought of scrambling is introduced to make the stego-label out of order. The embedding unit of stego-label is in charge of intercepting and analyzing the network packets,as well as embedding stego-label for the subject. The detecting unit of stego-label is designed to detect the existence of stego-label in the network packets. If the label is not exists, the packet is abandoned and the object is denied to access; if exists, the packet flow is controlled by the rules of access control, and the access from the object to the subject is effectively managed. In addition, some access rules f the access control methods are fully described. So the access rule can be flexibly selected according to the access control bits.At last, the prototype of NCC-AC model is realized and tested. The experiment result shows that the model is effective and available.
Keywords/Search Tags:convert communication, access control, networking protocol, stego-label, NCC-AC
PDF Full Text Request
Related items