English  |  正體中文  |  简体中文  |  Items with full text/Total items : 49287/83828 (59%)
Visitors : 7157362      Online Users : 86
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/74417


    Title: 準網路實體隔離技術之研究與實現
    Other Titles: Research and implementation of quasi physical isolation network
    Authors: 曾光毅;Tseng, Kuang-Yi
    Contributors: 淡江大學資訊管理學系碩士班
    梁德昭;Liang, Te-chao
    Keywords: 網路實體隔離;Physical Isolation
    Date: 2011
    Issue Date: 2011-12-28 18:35:26 (UTC+8)
    Abstract: 本研究為實現網路實體隔離中協定隔離的方法,又因實現過程中無使用開關方式的網閘,我們將這樣的架構稱為準網路實體隔離架構。準網路實體隔離技術使用通訊協定隔離的網路屏蔽技術。透過通訊協定不同,讓資料的傳輸過程不存在一個實際的TCP/IP連線,達成網路屏蔽的效果。
    有別於一般屏蔽技術是利用黑名單阻擋的方式,此種屏蔽技術在傳遞資料時,是透過白名單的方式將信任的應用程式或通訊協定來傳遞。這樣可以阻擋機敏網路中因使用者使用習慣而產生的蠕蟲攻擊無效。而透過協定的隔離,我們可以防止IP協定中利用Optional data欄位中產生的各樣攻擊行為,例如ICMP attack,來威脅我們的機敏網路。
    這樣的技術與架構可以使用在存在有機密敏感性資料的區域網路中,使得機密敏感性資料不因網路的連結而外流。在效果上比起傳統使用防火牆的屏蔽技術,準網路實體隔離可以阻擋因TCP/IP漏洞所產生的各種威脅與攻擊。實現方法使用了虛擬化的作業系統,兩主機間使用的通道為虛擬的橋接器,確保隔離兩主機間的通道專屬於兩主機。
    This research is to implement the protocol isolation of the physical isolation net-work. Because of the implementation process without using physical switching gate-way, we will call that the quasi physical isolation network. Quasi physical isolation network technology is using internet protocol isolation technology. Through different protocols, data transmission does not exist a real TCP/IP connection, to reach the network shielding.
    Unlike ordinary shielding technology blocking connections use blacklists. This shielding technology passes connections using white lists of trusted applications or protocols. In this way, we can block worms due to bad user habits. And through the protocol of separation, we can prevent attack from using Optional data field in IP protocol, such as ICMP attack.
    We can use this architecture in the sensitive information confidential in the pres-ence of the local area network, so sensitive information would not outflow because of the network connection. Comparing with traditional firewalls, quasi isolation network can block threats and attacks which exercise shortcoming of TCP/IP modules. We use VM systems to Implement and use virtual bridges between two virtual machines to ensure two virtual machines has privacy tunnel.
    Appears in Collections:[資訊管理學系暨研究所] 學位論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML190View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback