首页 | 本学科首页   官方微博 | 高级检索  
     检索      

IP网络访问控制机制的设计与实现
引用本文:李莉,沈苏彬.IP网络访问控制机制的设计与实现[J].南京邮电大学学报(自然科学版),2007,27(3):48-53.
作者姓名:李莉  沈苏彬
作者单位:南京邮电大学,信息网络技术研究所,江苏,南京,210003
摘    要:网络安全问题的严峻性和安全需求的普遍化,要求人们有必要在IP网络中提供基础安全控制.基于面向网络基础设施的安全模型,通过分析网络层的安全威胁,设计了IP网络访问控制机制.该机制由密钥协商和报文检测协议组成,实现通信双方的双向身份验证,保证传输过程中报文的真实性和完整性.在比较各类形式化技术的基础上,采用抽象协议表示法对相关协议进行了形式化描述和验证.该访问控制机制提供网络主机间的访问控制,解决了其他在网络边缘实施的访问控制机制无法解决的网络内部安全问题.该机制适合在较小的网络范围内实施,如局域网等,适合于更大网络范围的机制正在研究中.目前已经在Linux平台上实现了该机制,并简单分析其性能.

关 键 词:访问控制  密钥协商  报文检测  网络范围  访问控制机制  设计  Networks  Control  Mechanism  Access  Implementation  性能  平台  Linux  研究  局域网  内部安全  实施  网络边缘  网络主机  形式化描述和验证  相关协议  表示法  形式化技术
文章编号:1673-5439(2007)03-0048-06
收稿时间:2006-09-30
修稿时间:2006-09-30

Design and Implementation of Access Control Mechanism in IP Networks
LI Li,SHEN Su-bin.Design and Implementation of Access Control Mechanism in IP Networks[J].Journal of Nanjing University of Posts and Telecommunications,2007,27(3):48-53.
Authors:LI Li  SHEN Su-bin
Institution:Institute of Information Network Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
Abstract:The austerity of network security problems and the generalization of security requirement make it necessary to provide fundamental security control in IP networks. Through the analysis of threats on network layer, an access control mechanism in IP networks is designed based on the network infrastructure-oriented security model. Consisting of key exchange protocol and packet check protocol, it implements dual authentication between hosts, and guarantees the authenticity and integrity of packets in transmission. Based on the comparison between different formal techniques, Abstract Protocol Notation is used to describe and validate these two protocols. The mechanism provides access control between network hosts, and is able to solve inner security problems that can not be settled by those mechanisms implementing on the edge of networks. The mechanism is suitable for small scale networks such as LANs, and the mechanism used for large-scale networks is under development. The mechanism has been implemen- ted on Linux platform and its performance is analyzed briefly.
Keywords:access control  key exchange  packet check
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号