首页> 外文OA文献 >Firewalls and virtual private networks
【2h】

Firewalls and virtual private networks

机译:防火墙和虚拟专用网

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The Internet has become a global computing phenomenon, and during the 1990's has had more influence on the computer- communications industry than any other development in its history. There are two major issues effecting the development of the Internet for the 21st century; performance and security. This thesis is concerned with the later; in particular the issues raised by the interconnection of TCPIIP based networks between trusted and untrusted network domains. Four main topics are addressed: the common threats and vulnerabilities that effect the TCP/IP protocol suite at the Network, Transport, and Application layers; the application of firewall architectures to counter the risks posed by TCP/IP based connections between trusted and untrusted network domains; the issue of independent firewall architecture evaluation and certification; and the application of Virtual Private Network (VPN) technology to protect traffic over untrusted networks. This thesis examines the common threats and vulnerabilities which effect the current TCP/IP protocol suite, and hence the Internet. A firewall architecture can be a powerful tool for preventing attacks based on TCP/IP vulnerabilities, however, it is only as effective as the security policy that it implements. Although firewalls can benefit computer and network security, they suffer from several significant limitations, including; the inability to protect network traffic; defending against insider abuse; and controlling the content of end-user access (e.g. virus infected files, Java applets, etc.) Firewalls are generally considered impregnable, however they are certainly not immune to software and hardware vulnerabilities. Therefore, this thesis examines independent evaluation and certification of firewall architectures with particular focus on New Zealand and Australian efforts. The final section of this thesis examines the use of VPNs for securing network traffic. The amalgamation of VPN and firewall technologies allows the security policy to be extended onto the network in the form of services, such as, confidentiality, integrity, non-repudiation, and strong authentication.
机译:互联网已经成为一种全球计算现象,并且在1990年代,它对计算机通信行业的影响要超过其历史上的任何其他发展。影响21世纪Internet发展的两个主要问题是:性能和安全性。本论文与后面的内容有关。尤其是受信任和不受信任的网络域之间基于TCPIIP的网络的互连所引起的问题。解决了四个主要主题:在网络,传输和应用程序层影响TCP / IP协议套件的常见威胁和漏洞;防火墙体系结构的应用,以应对受信任和不受信任的网络域之间基于TCP / IP的连接带来的风险;独立防火墙体系结构评估和认证问题;虚拟专用网(VPN)技术的应用来保护不受信任的网络上的流量。本文研究了影响当前TCP / IP协议套件以及Internet的常见威胁和漏洞。防火墙体系结构可以作为防止基于TCP / IP漏洞的攻击的强大工具,但是,它的有效性仅与它实施的安全策略一样有效。尽管防火墙可以使计算机和网络安全受益,但它们仍受到一些重大限制,包括:无法保护网络流量;防止内部人遭受虐待;以及控制最终用户访问的内容(例如,受病毒感染的文件,Java applet等),防火墙通常被认为是不可渗透的,但是它们肯定不能幸免于软件和硬件漏洞。因此,本文研究了防火墙体系结构的独立评估和认证,尤其侧重于新西兰和澳大利亚的努力。本文的最后一部分探讨了使用VPN来保护网络流量。 VPN和防火墙技术的融合允许安全策略以服务的形式扩展到网络上,例如保密性,完整性,不可抵赖性和强身份验证。

著录项

  • 作者

    Harris B. A.;

  • 作者单位
  • 年度 1998
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号