计算机科学与技术专业毕业设计(论文)外文翻译.doc
《计算机科学与技术专业毕业设计(论文)外文翻译.doc》由会员分享,可在线阅读,更多相关《计算机科学与技术专业毕业设计(论文)外文翻译.doc(34页珍藏版)》请在三一办公上搜索。
1、郑州轻工业学院本科毕业设计 文献翻译 题 目 IP协议及IPSec协议安全分析 学生姓名 专业班级 计算机科学与技术 2003-1班 学 号 56 院 (系) 计算机与通信工程学院 指导教师 ) 完成时间 2007 年 6 月 6 日 英文原文The Analysis Of IP and IPSec Protocols Security Problem1. OSI model in time for TCP/IP protocol Overview1.1 OSI model in time for TCP/IP protocol introduce It was repose Internat
2、ional Organization for Standardization suggest to whereas extend arisen, it broke into seven layer into to that OSI model (open system interconnection reference model). The overdone bulkiness, intricacy incur know clearly heap criticism of the is ISO constitutive OSI reference model. As shown in the
3、 following chart Application layerApplication layerPresentation layerSession layerTransport layerTransport layerNetwork layerNetwork layerData link layerNetwork interface layerPhysical layerGraphic 1.1 OSI model and TCP/IP modelThe practical application sense nope very large, thereof forsooth toward
4、 fathom network protocol interior wield did very avail out of the refer to network cannot but talk OSI reference model, notwithstanding OSI reference model. In reins network world liner, TCP/IP protocol suite obtain know clearly still for extensive application. These OSI seven layer model suffer, pe
5、r layer big city provide thereon thickness with, combine one visit mouthpiece or interface. The homology hierarchy entitled peer layer of the differ mainframe of compartment. Stand for and mainframe B menses presentation layer each other for peer layer, mainframe A menses session layer and mainframe
6、 B menses session layer each other for peer layer grade among as if mainframe A. Session layer and stand for (these double-deck function by merge to application layer realize) among at TCP/IP reference model suffer, take out know clearly OSI reference model. 1.2 TCP/IP presence frangibility It was r
7、un low of virtual security authentication and crypto system, there into up most factor namely IP address problem that IP layered major defect. R command , NFS, X window grade big city is repose IP address versus user proceed authentication and authorization to among that of TCP/IP protocol with IP a
8、ddress came by way of network node alone one identification, heap TCP/IP serve, include Berkeley. Source IP address estimation compact technique authenticity and security among both that of currently TCP/IP cellular security mechanism primarily repose IP address WRAPT filtration(packet filtering) an
9、d authentication (authentication) technology, its validity incarnate at could warranty IP WRAPT. The shield, sans versus IP fold misogyny IP address authenticity authentication mechanism and security measure in of whereas IP address lie heap problem, consultative maxima shortcoming namely sans versu
10、s IP address. The shield, sans versus IP fold misogyny IP address authenticity authentication mechanism and security measure in of whereas IP address lie heap problem, consultative maxima shortcoming namely sans versus IP address.It was repose IP protocol of last, TCP subsection and UDP protocol dat
11、a packet is encapsulation be on the security menace of IP WRAPT suffer at network upper Tran missive, wherefore sameness be confronted with IP layer station encounter that owing to UDP. Now that people all the while in thought method set, yet still avoid less namely as per TCP tie hour in at rest th
12、rice handshake Machine-made attack. Either these attack summarize arisen include:One: source address cheat(source address spoofing) or IP cheat(IP spoofing);Two: source routing select cheat(source routing spoofing);Three: rip attack(rip attacks);Four: discriminate attack(authentication attacks);Five
13、: TCP serial number cheat(TCP sequence number spoofing);Six: TCP/IP protocol data stream adopt plaintext transmission;Seven: TCP serial number BOMB attack(TCP SYN flooding attack), for short SYN attack;Eight: easy fraudulence (ease of spoofing).1.3 Network Security Both moiety end user versus thereo
14、f visit, furthermore enterprise network proper no more will exterior closed among be mainframe computer system suffer among it was one relatively walkway that it was resource that both that of one be indispensable to whereas important factor among Network security right through data network. Prepara
15、tory network suffer, none but calculator proper and application. Shield this resource. Confidential data by memory at one fit on glass hall. Past crypto guard make inspect weight, nothing but allowed at enterprise network. Versus heap government sector and academic institution came said, internet ex
16、cept one design to transponder electronic mail and proceed document transmission instrument.There be the resource completeness exposure at hacker, juggler and those hellion attack of down, there into likely to return include some immoral numerator in order to or certain still ugly motive station ong
17、oing destroy of it was completeness visible that the revolution transfer know clearly possession all these of the both internet and computer technology. Now, calculator full high speed, cheapness combine possess resolvability, general design to depot private and confidential information. Internet in
18、 the range of get folk in an OSI to at global proceed without a hitch corresponding also, thereof unreliability no more will conceivable. These purport end user transmitting data station utilized network element likely to met absence their dam within sight back. If data proper yes confidential, it w
19、ith met expose likely to burglar, by have no right limit user check or bowdlerize through to. In the meanwhile, special enterprise network too need for use internet combine therewith mutual to. Internet at advertisement and e-business aspect repose whereabouts huge business opportunity, versus user
20、came said internet must. Figure full high speed, cheapness combine possess resolvability, general design to depot private and confidential information up lead folk in a OSI to at global within range proceed without a hitch corresponding also, thereof unreliability no more will conceivable to it mean
21、s end user transmitting data station utilized network element likely to met absence their dam within sight back. But do so should gotten enterprise network T-number now that, figure full high speed, cheapness combine possesses resolvability, general design to depot private and confidential informati
22、on up. In despite of cause how about, now versus network security requirements ratio anciently tighten up, too still necessity to know clearly.It was be on the foundation upward strain for security insure of IP-layer or still definitely said yes at each IP grouping that both data stream among as a m
23、atter of fact us has manifold means useful for protective network. Could through the medium of be on the fringe erect one fire wall, filter come off those undefeated data stream out for of dedicated network. Application and transport protocols command thereof own security mechanism. Other kind of te
24、chnology, considering hereinafter several cause lead such approach possess definite meaning to:1. The Intranet big city yes repose IP of the both internet and enterprise. Proprietary data stream quantity big city must through IP-layer. Proprietary data too big city yes by IP grouping came load-suppo
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机科学 技术 专业 毕业设计 论文 外文 翻译
链接地址:https://www.31ppt.com/p-4031532.html