首页 | 本学科首页   官方微博 | 高级检索  
     

基于局域网私设NAT场景发现与管控系统的研究
作者姓名:肖红谊  张勐  王振东
作者单位:大丰区供电公司,大丰区供电公司,大丰区供电公司
摘    要:近年来,运检数字化大规模推广,随之带来的网络资源需求不断增长,网络安全防护要求也不断提高。为适应不断扩展的数字化业务,改善变电站数字化网络质量,解决现有Ⅳ区IP地址资源匮乏的阶段性客观难题,各种技术手段层出不穷,各有优劣,其中NAT技术最为常见,使用范围最广;为提升网络安全性能水平,确保变电站网络资源的安全高效利用,通过对变电站(供电所)私设NAT场景进行研究,设计变电站(供电所)局域网私设NAT场景发现与管控系统,将变电站及供电所相关IP地址规划导入系统,系统通过数据流截取方式分析网络中所有的NAT场景,最终实现网络管理员对网络私设NAT场景分类管理。通过技术手段有效掌握网络中的私有NAT数量及私有IP地址使用情况,提高网络的安全性,在发生安全事故时,准确地进行溯源工作。

关 键 词:网络地址转换  生存时间值  IP地址资源匮乏  有效溯源  网络安全
收稿时间:2023/4/12 0:00:00
修稿时间:2023/5/22 0:00:00

Research on the Discovery and Control System of Private NAT Scenarios Based on Local Area Networks
Authors:xiaohongyi  zhangmeng and wangzhendong
Affiliation:da feng qu gong dian gong si,da feng qu gong dian gong si,da feng qu gong dian gong si
Abstract:In recent years, the large-scale promotion of digitalization in transportation inspections has brought about an increasing demand for network resources and increasing requirements for network security protection. In order to adapt to the ever-expanding digital business, improve the quality of substation digital network, and solve the staged objective problem of the lack of IP address resources in the existing IV area, various technical means emerge in endlessly, each with its own advantages and disadvantages, among which NAT technology is the most common and widely used ;In order to improve the network security performance level and ensure the safe and efficient use of substation network resources, through the research of substation (power supply station) private NAT scenario, design the private NAT scene discovery and control system of substation (power supply station) LAN, substation and The relevant IP address planning of the power supply station is imported into the system, and the system analyzes all NAT scenarios in the network through data flow interception, and finally realizes the classified management of network private NAT scenarios by network administrators. Effectively grasp the number of private NATs in the network and the usage of private IP addresses through technical means, improve the security of the network, and accurately trace the source when a security incident occurs.
Keywords:network address translation  time-to-live value  lack of IP address resources  trace the source  network security
点击此处可从《》浏览原始摘要信息
点击此处可从《》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号