期刊文献+

校园网IPSecVPN系统实现及性能分析

Realization and Performance Analysis of IPSecVPN System in Campus Network
下载PDF
导出
摘要 通过对校园网的现状分析,利用校园网已有网络架构实现了基于IPSec协议的VPN系统。在VPN系统实现的基础上,使用数据包抓包与分析工具WireShark等技术对IPSecVPN系统性能进行测试分析。结果表明该系统整体效果良好,有效的解决了两个校区间资源共享和信息交流的安全性和可靠性问题。 Through the analysis of the status quo of the campus network, the VPN system based on the IPSec protocol is realized by using the existing network architecture of the campus network. Based on the realization of the VPN system, the performance of the IPSecVPN system are analyzed by using packet capture and analysis tool WireShark technology. The results show that the system has good overall effect, and effectively solve the security and reliability issues of resource sharing and information exchange between the two campuses.
作者 李长春
出处 《攀枝花学院学报》 2017年第2期35-40,共6页 Journal of Panzhihua University
基金 安徽省质量工程示范实验实训中心项目"省级示范实训中心"(2014sxzx032) 2015年滁州职业技术学院质量工程项目"基于工学结合的E-Learning平台高职双师型教师培养模式创新研究"(zjjt201516) 2016年滁州职业技术学院科研规划立项课题"基于云计算的高职院校数据中心虚拟化建设与资源调度技术研究"(YJY-2016-04)
关键词 校园网 IPSeVPN 安全性 WIRESHARK campus network IPSecVPN security WireShark
  • 相关文献

参考文献4

二级参考文献21

  • 1李学军,武文忠,张聪闪.推进校园卡管理系统 搭建信息化基础平台[J].中国教育网络,2004(12):59-60. 被引量:2
  • 2王春雁,朱文英.2004-2005年校园卡建设与应用现状分析(下)[J].教育信息化,2005(5):6-7. 被引量:13
  • 3宜建军,牛晓燕.校园一卡通管理系统的设计与实现[J].河北工业科技,2007,24(2):90-92. 被引量:13
  • 4DIFFIE W, HELLMAN M E. New directions in cryptography[J]. IEEE Transactions IEEE Transactions on Information Theory, 1976, IT-22(6):644-654.
  • 5DELICA R, SCHNEIDER S. A formal approach for reasoning about a class of Diffie-Hellman protocols[A]. Proc of Formal Aspects in Security and Trust[C]. Tyne, UK,2005.34-46.
  • 6MILLEN J, SHMATIKOV V. Symbolic protocol analysis with products and Diffie-Hellman exponentiation[A]. 16th IEEE Computer Security Foundations Workshop[C]. Pacific Grove, CA, USA, 2003. 47-61.
  • 7KAPUR D, NARENDRAN P, WANG L. Analyzing protocols that use modular exponentiation: Semantic unification techniques[A]. Proc of RTA[C]. Valencia, Spain, 2003.
  • 8CHEVALIER Y, KUSTERS R, RUSINOWITCH M, et al. Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption[J]. ACM Trans Comput Logic, 2008 9(4):1-52.
  • 9BRESSON E, LAKHNECH Y, MAZARE L, et al. A generalization of DDH with applications to protocol analysis and computational soundness[A]. Advances in Cryptology-CRYPTO 2007[C]. Santa Barbara, CA, USA,2007.482-499.
  • 10ZHU L, TUNG B. Public Key Cryptography for Initial Authentication in Kerberos (PKINIT)[S]. RFC 4556, 2006.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部