首页 | 本学科首页   官方微博 | 高级检索  
     

一种面向Intranet的P2TD3R安全通信模型研究
引用本文:杨德胜,张义超,郭星,李炜.一种面向Intranet的P2TD3R安全通信模型研究[J].现代电子技术,2012,35(2):47-50.
作者姓名:杨德胜  张义超  郭星  李炜
作者单位:1. 国网电科院安徽南瑞继远软件有限公司,安徽合肥,230088
2. 中国电信巢湖分公司,安徽巢湖,238000
3. 安徽大学计算机科学与技术学院,安徽合肥,230039
基金项目:安徽大学211工程三期教学质量工程基金资助项目(XJ200921)
摘    要:首先分析了P2DR网络安全模型和分布式网络安全模型,在吸收上述2个安全模型优点的基础上,考虑接入网络复杂性的基础上,提出一种P2TD3R安全网络安全模型,该模型将P2DR由网络入口点的检测拓宽到对网络的全面检测,采用端口镜像策略,规避了分布式安全模型对用户网络性能造成影响的缺点。最后,根据P2TD3R安全模型给出了组网实例,编写相应的检测软件和具体的实施细节。

关 键 词:内容检测  接入网  安全体系  P2TD3R

Research on P2TD3R telecom security model used in Intranet
YANG De-sheng , ZHANG Yi-chao , GUO Xing , LI Wei.Research on P2TD3R telecom security model used in Intranet[J].Modern Electronic Technique,2012,35(2):47-50.
Authors:YANG De-sheng  ZHANG Yi-chao  GUO Xing  LI Wei
Affiliation:1. Anhui Nanri Jiyuan Software Co. , Ltd, SGEPRI, Hefei 230088, Chinas 2. Chins Teleom Chaohu Branch Co. , Ltd, Chaohu 238000, Chinas 3. Computer Institute, Auhui University, Hefei 230039, China)
Abstract:The P2DR network security model and distributed network security model are analyzed. A P2TD3R security network security model is proposed based on the merit utilization of the two security models and the consideration of the access network complexity. The detection range of P2DR is broadened by the model from the network access point detection to the entire network detection. Because of the application of the port mirror-image strategy; completely transparent to the network nodes, the shortcomings that the distributed security model affects the users' network performance are avoided. The networ- king examples are given according to the security model P2TD3R. The corresponding test software and the implementation details are compiled.
Keywords:content detection  access networks security systems P2TD3R
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号