期刊文献+

一种基于IPSEC协议的城市基础地理信息系统的安全方案

Security Solution for City Foundation Geography Information System Based on IPSec
下载PDF
导出
摘要 为了消除网络在信息安全上存在的隐患,简述了城市基础地理信息的安全体系结构,分析若干易被忽视的协议漏洞,说明黑客由此入侵的特殊途径;通过具体给出IPv6环境下的IPSec协议的实现方法,如为终端服务通信创建IPSec筛选器列表、使用IPSec策略阻止特定网络端口的入侵及设置IPSec VPN等;提供有关城市基础信息系统信息安全的一种新的基于IPSec协议的升级解决方案,实践应用表明该方案是可行且有效的。 In order to eliminate the network information security hidden danger in modern net, the security architecture of city foundation geography information system is introduced, some slighting security hole of protocol are analyzed, several hackerintrusion approaches by way of such holes are described,and the realization approaches of IPSec protocol in IPv6, such as creating the list of IPSec filter for the terminal services communication, using the IPSec policy to prevent the specific network ports from the intrusion, setting up IPSec VPN etc,are provided in more details, then it presents a new kind of method to prevent intrusion of city foundation geography information system based on IPSec in this paper, the practice application indi cates that this plan is feasible and effective.
出处 《现代电子技术》 2008年第22期121-124,共4页 Modern Electronics Technique
基金 863计划项目子课题资助(2002AA134078)
关键词 城市基础地理信息 安全安全 网络入侵 IPSEC协议 city foundation geography information information security network intrusion IPSec protocol
  • 相关文献

参考文献9

  • 1Martin Abadi. Explicit Communication Revisited Two New Attacks on Authentication Protocols~J~. IEEE Transactions on Software Engineering, 1997,23(3): 185 - 186.
  • 2解建军,李俊红.密钥分发协议及其形式化分析[J].河北师范大学学报(自然科学版),2003,27(6):570-573. 被引量:2
  • 3Kent S, Atkinson R. IP Encapsulating Security Pay - load [EB/OL]. http:// www. ietf. org/html.charters/ipsec - charter. html : November1998.
  • 4Kent S, Atkinson R. Security Architecture for the Internet Protocol[S]. RFC2401,1998.
  • 5Kent S, Atkinson R. IP Encapsulating Security Payload (ESP) [S]. RFC2406,1998.
  • 6Kent S, Atkinson R. IP Authentication Header(AH) [S]. RFC2402,1998.
  • 7刘渊,范晓岚,王开云,姜建国.IPSec的安全属性及其技术途径分析[J].计算机工程与设计,2005,26(10):2627-2629. 被引量:7
  • 8严新,常黎.IPSec研究及实现[J].计算机工程与设计,2005,26(9):2458-2460. 被引量:4
  • 9Hazem Hamed,Will Marrero. Modeling and Verification of IPSec and VPN Security Policies . ICNP,2005(13): 259 -278.

二级参考文献22

  • 1BURROWS M, ABADI M, NEEDHAM R. A logic of authentication [J ]. On Computer Systems, 1989,8( 1 ) : 18-36.
  • 2LOWE G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR [A]. In:Proc Tools and Algorithms for the Construction and Analysis of Systems [C]. New York:Springer-verlag, 1996. 147-166.
  • 3KYNTAJA T. A logic of authemtication by Burrows, Abadi and Needham[ EB/OL]. http://www. tml. hut. fi/opinnot/Tik-110. 501/ban. html, 1995-07-18.
  • 4Kent S, Atkinson R. Security architecture for the internet protocol[S]. RFC2401, 1998.
  • 5M Gilmore Linda,Hall Charles, Barbara Mayer, et al.U.S. department of defense virtual private network (VPN) boundary gateway protection profile (PP) for basic robustness environments[R]. 2001.
  • 6Niels Ferguson Schneier Bruce. A cryptographic evaluation of IPSec[EB/OL]. 1999-04. http:∥www. counterpane.com.
  • 7Kent S, Atkinson R. IP encapsulating security payload[S]. RFC-2406, 1998.
  • 8Kent S, Atkinson R. IP authentication header[S].RFC2402, 1998.
  • 9Harkins, D Carrel D. The internet key exchange[S]. RFC2409,1998.
  • 10Radia Perlman Charlie Kaufman. Analysis of the IPSec key exchange standard[EB/OL].2001-06. http:∥csdl.computer. org.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部