期刊文献+

VPN拓扑中关联控制技术的研究

Research for Correlative Control Technology in the VPN Topology
下载PDF
导出
摘要 网络拓扑的安全性是保障网络服务安全的核心研究内容;尤其在虚拟私有网络(VPN:Virtual Private Network)拓扑中,由于VPN的隧道技术、私有路由技术和加密技术,一方面使得内部服务群暴露在Internet中,另一方面增加防火墙和入侵检测系统(IDS:Intrusion Detection System)保护内部网络的难度。为此,本文提出以VPN网关为中心,协同用户终端、防火墙、IDS和内部的应用服务,构建的多层安全防护机制--关联控制机制(CCM:Correlative Control Mechanism)。CCM将终端延伸、IDS关联和应用引擎三者关联,使得VPN防护构成一个关联整体,提高了网络拓扑的安全性。 The research of the security of the network topology is the core content for the guarantee for the security of the network services. Especially in the VPN(Virtual Private Network)topology, because of the VPN's tunneling, private routing and cipher technology, there are two embarrassments for the protection of the internal network. One is the internal services could be uncovered in the internet by the VPN's tunneling, the other is firewall and IDS(Intrusion Detection System)could not completely analyze the network packet content because of the VPN's private routing and cipher technology. Hence, we propose CCM(Correlative Control Mechanism)that is a multilayered security protection mechanism based on VPN gateway incorporating client end-point, firewall, IDS and internal services. By the correlation among terminal-extending, IDS-correlation and application-engine, CCM can make the VPN protection into one correlative whole and improve the security of the VPN topology.
出处 《计算机科学》 CSCD 北大核心 2007年第1期39-41,152,共4页 Computer Science
基金 国家自然科学基金 编号60373088
关键词 虚拟私有网络 关联控制机制 多层安全防护 Virtual private network, Correlative control mechanism, Multilayered security protection
  • 相关文献

参考文献9

  • 1Cohen R.On the Establishment of an Access VPN in Broadband Access Networks.Communications Magazine,IEEE,February2003,41(2):156~163 被引量:1
  • 2Kent S,Atkinson R.Security Architecture for the Intemet Protocol.RFC2401,November 1998 被引量:1
  • 3Dierks T,Allen C.The TLS Protocol Version 1.0.RFC2246,January 1999 被引量:1
  • 4欧阳凯,周敬利,夏涛,余胜生.基于SSL VPN接入机制的研究[J].计算机科学,2005,32(5):59-63. 被引量:7
  • 5卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 6Denning D E.An intrusion-detection model.IEEE Transactions on Software Engineering,1987,13 (2):222~232 被引量:1
  • 7Dillis C D.IDS event correlation with SEC-the simple event correlator:[White paper].Available at:http://www.giac.org.2005 被引量:1
  • 8Zhang Xinyou,Li Chengzhong,Zheng Wenbin.Intrusion Prevention System Design.In:Proceedings of the Fourth International Conference on Computer and Information Technology.September2004.386~390 被引量:1
  • 9欧阳凯,周敬利,夏涛,余胜生.基于虚拟服务的SSL VPN研究[J].小型微型计算机系统,2006,27(2):228-232. 被引量:15

二级参考文献70

  • 1Cohen R.On the establishment of an access VPN in broadband access networks[J].Communications Magazine,IEEE February 2003,41(2):156-163. 被引量:1
  • 2Kent S,Atkinson R.Security architecture for the internet protocol[S].RFC2401,November 1998. 被引量:1
  • 3Dierks T,Allen C.The TLS protocol version 1.0[S].RFC2246,January 1999. 被引量:1
  • 4Rescorla E,Schiffman A.The secure HyperText transfer protocol[S].RFC2660,August 1999. 被引量:1
  • 5Sandhu R S,Coyne E J,Feinstein H,Youman C.Role-based access control models[J].IEEE Computer,1996,29(2):38-47. 被引量:1
  • 6Dimitrakos T,Djordjevic I,Matthews B,et al.Policy-driven access control over a distributed firewall architecture[J].Policies for Distributed Systems and Networks,2002:228-231. 被引量:1
  • 7Jason J,Rafalow L,Vyncke E.IPSec configuration policy information model[S].RFC3585,August 2003. 被引量:1
  • 8Xin Guo,Kun Yang,Galis A,et al.A Policy-based network management system for IP VPN[C].Communication Technology Proceedings,2003.ICCT 2003.2003,(2):1630-1633. 被引量:1
  • 9Ryutov T,Neuman C,Dongho Kim.Integrated access control and intrusion detection for Web servers[J].Parallel and Distributed Systems,IEEE Transactions.September 2003,(14):841-850. 被引量:1
  • 10Bhatt D V,Schulze S,et al.Secure internet access to gateway using secure socket layer[J].Virtual Environments.Human-Computer Interfaces and Measurement Systems.2003:157-162. 被引量:1

共引文献253

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部