Font Size: a A A

Using IPSec To Improve The Security Of Network Transmission

Posted on:2003-04-21Degree:MasterType:Thesis
Country:ChinaCandidate:J GuoFull Text:PDF
GTID:2168360062986145Subject:Computer applications
Abstract/Summary:PDF Full Text Request
On the basis of studying the theory of IPSec, the thesis implements the safe architecture of IPSec in Linux kernel, which is in the environment of IPv6, and tests the security of IPSec by designing and constructing an example of a virtual private network.After earnestly studying the theory of IPSec, I know the architecture of IPSec very well. On the basis of it, I design and implement IPSec in the network protocol stack of Linux kernel, which can verify the encryption, integrity and authenticity of data at the IP level. It solves the problem of identification deceit, malicious modification and interception when datum is transmitted on the network, and the security of network transmission is improved greatly. Finally, I take advantage of IPSec to design and construct an example of a virtual private network, and test the security mechanism of IPSec that has been implemented by monitoring and analyzing the communication data.As far as the security of network transmission is concerned, the implementation of IPSec has many practical advantages. Firstly, unlike other technologies that verify security at high-level protocol, verifying security at IP level is transparent to applications and end-users that don' t have to be modified even if there is any change at IP level. Secondly, another conspicuous advantage is that it can be used on any machine that uses IP protocol to communicate. No matter IPSec runs on routers, on firewall machines, on various application servers, and on end-user desktop or laptop machines, it can verify security of network transmission. Last but not the least, using IPSec to implement a virtual private network is one of the main methods that realize a local network in an enterprise by Internet. IPSec makes it possible to securely communicate over the insure Internet, just like a reliable local network in an enterprise. ItIIcan save much money for enterprises and users as well as verify security.
Keywords/Search Tags:IPSec, AH, ESP, VPN, Linux
PDF Full Text Request
Related items