Font Size: a A A

Data Encryption On Network Based On NDIS Intermediate Driver Model

Posted on:2010-06-01Degree:MasterType:Thesis
Country:ChinaCandidate:J B LiFull Text:PDF
GTID:2178360302460372Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the increasing development of Internet technology , network security has become increasingly prominent and the threat of hacking the information that transmit on the network has posed more seriously. Within the enterprise not only to resist the interception and destruction of its critical data which is from the external, but also to prevent internal staff breaching important data by the network intentionally or unintentionally. Therefore, to achieve security of computer network communications become an urgent needed to solve.At present, the main network security products are firewall system, intrusion detection systems (IDS), VPN (Virtual Private Network), etc. It is assumed that the network security threats come from outside, rather than the corporate internal network. However, as internal network users can be more easily to access confidential information, they can lead to the leakage of valuable information.Therefore,the above products can not guarantee the important data within the enterprise from leaking.Traditional data encryption is through a certain encryption algorithm to encrypt or decrypt the data manually. It needs manual encryption and decryption and it is very complicated. Above all, traditional data encryption can not solve the data leakage behavior which is from internal staff within enterprise.This article based on NDIS intermediate layer filter drive technology, combined with the use of several pairs of stream encryption algorithm, designs and implements a network transparent data encryption system. The system can effectively prevent important data from leaking out through the network without manual encryption and decryption operations. Its encryption and decryption operations are in the system drive layer and the whole process is completely transparent.Finally, the system has been tested in the network which installs this system. The network data can be transmitted the same as normal without this system. The user can not feel the process of encryption and decryption of data. Once the data reception side without the system environment, it can not read the received data. These indicate that the system can effectively protect enterprise's critical data from leakage through the network.
Keywords/Search Tags:Information Security, Network Data Transfer, NDIS Intermediate Driver, Transparent Encryption, Prevent Data Leakage
PDF Full Text Request
Related items