期刊文献+

基于IP加密的网络审计系统模型 被引量:1

Network auditing system based on IP encryption
下载PDF
导出
摘要 网络审计系统广泛应用于园区网络,实现园区网络内的身份认证、访问控制、日志记录以及流量计费等功能.随着网络应用的广泛和深入,网络行为监控已经成为一种必要的管理手段.为此提供了一种基于IP加密技术的网络审计系统模型,可用于完成上述管理功能,并提供一种分析统计网络性能的有效手段.所谓的IP加密是将用于判断用户数据包合法性的必要信息封装在一个自定义的IP包头中.这样,当网络流量日志采集服务器接收到这种数据包时,既可以判断出该数据包的所属用户,又可以判断该数据包是否为合法数据包;此外,将其他信息添加到自定义包头的相应字段后,还可以实现对特定区域网络流量的监控. The Network Auditing System usually used to implement the user authentication,access control,log recording and other functions such as flow charge in a large network.The supervisory control of the user behavior in the network has already become a necessary management means when the network is more and more important.This paper describes a network auditing system based on IP encryption,which can be used to achieve above-mentioned functions,and offer a simple method to analyze the performance of the network.The so-called IP encryption is to encapsulate some essential message into a self-defined IP-header.When the special packets are routed to the gateway,it can be judged if they are valid and who is their owner.Adding more information in the section of the self-defined IP-header,the flow of the selected network can be routed to the monitoring station to be supervised.
出处 《大连理工大学学报》 EI CAS CSCD 北大核心 2005年第z1期59-61,共3页 Journal of Dalian University of Technology
关键词 IP加密 流量审计 网络性能检测 加密审计系统 IP encryption network auditing system performance of the network EAS
  • 相关文献

参考文献3

二级参考文献12

  • 1(美)Bovet DP Cesati M.Understanding the Linux Kernel:2nd Edition[M].O''Reilly,December 2002..
  • 2(美) Borer DP. Cesati M. Understanding the Linux Kernel[ M]. 2nd Edition. O'Reilly. December 2002.
  • 3(美) Tumenbayar E. Linux SMP HOWTO[ EB/OL]. http://unthought. net/mirror - amp/% 257Eetumenba/smp - howto/SMP -HOWTO. html. 2002.
  • 4ebtables-iptablea interaction on a Linux-based bridge[EB/OL]. http://ebtablea. sourceforge. net/br_fw_ia/br_fw_ia. html. 2002.
  • 5Complete Linux Loadable Kernel Modules[EB/OL]. http://www.thc. org/papers/LKM HACKING. html. 2002.
  • 6The Linttx Kernel Module Programming Guide[EB/OL]. http://www. tldp. org/LDP/lkmpg/. 2002.
  • 7毛德操 胡希明.Linux内核源代码情景分析[M].杭州:浙江大学出版社,2002..
  • 8WANG Xin, SCHULZRINNE H. An integrated resource negotiation, pricing, and QoS adaptation framework for multimedia applications [J].IEEE Journal on Selected Areas in Communications, 2000,18(12):2514-2529
  • 9BASAR T, SRIKANT R. Revenue-maximizing pricing and capacity expansion in a many-users regime [EB/OL], http://www.ieee-infocom.org/2002/papers/300.pdf
  • 10MACKIE-MASON HAL J,K VARIAN. R Pricing the internet [A]. Public Access to the Internet [C]. Cambridge, MA, 1995.

共引文献2

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部