[1]郭锐,冯志杰,高宗宁. 一种新型网络通信协议的设计与研究[J].计算机技术与发展,2017,27(01):75-79.
 GUO Rui,FENG Zhi-jie,GAO Zong-ning. Design and Research of a New Network Communication Protocol[J].,2017,27(01):75-79.
点击复制

 一种新型网络通信协议的设计与研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年01期
页码:
75-79
栏目:
安全与防范
出版日期:
2017-01-10

文章信息/Info

Title:
 Design and Research of a New Network Communication Protocol
文章编号:
1673-629X(2017)01-0078-05
作者:
 郭锐冯志杰高宗宁
 中国科学院 信息工程研究所
Author(s):
 GUO RuiFENG Zhi-jieGAO Zong-ning
关键词:
 网络安全IP地址二义性新型网络通信协议安全通信
Keywords:
 network securitydouble meanings of IP addressnew network communication protocolsecure communication
分类号:
TP393.0
文献标志码:
A
摘要:
 互联网发展至今,尤其是移动互联网的快速发展极大地改善了人们的生活方式,但与之相伴的网络安全问题也愈发严重。这就迫使人们思考现有互联网体系架构设计的弊端,进而去寻求一种解决现有问题的途径。新型网络通信协议充分分析了现有TCP/IP网络的优缺点,针对其IP编址中存在的二义性问题展开思考,并结合通信市场上出现的各类终端的特点,提出了基于不同网络类型的两种数据包格式,在此基础上引入了IPsec的相关技术,为数据包通信添加安全保障。分析了现有网络存在的安全隐患,提出了加强安全通信的必要性。接着对新型网络通信协议进行了相关的探讨和研究,重点阐述了新型网络的特点及其与现有网络的区别。随后研究提出新型网络的整体框架,详细给出了各组成模块的功能原理。通过搭建测试环境对新型网络进行测试,验证了新型网络通信协议标准的可行性。
Abstract:
 With the rapid development of the Internet and the mobile Internet,the people’ s life has been greatly improved,but network se-curity issues have become increasingly serious. To improve the network status,people are forced to think about the disadvantages of the traditional network architecture design. The new network communication protocol analyzes the advantages and disadvantages of the exist-ing TCP/IP network. Based on the double meanings of IP address and all kinds of mobile terminals,the two packet formats are put for-ward. By drawing on the relevant technology of IPsec,the corresponding security module is added to guarantee the network security com-munication. The potential safety hazards is analyzed in the traditional network and the significance of strengthening safety communication is proposed. In the introduction of the new network communication protocol,it concentrates on discussing the new characteristics of the new network and its difference to the traditional network. And then,the structure of the new network is researched,and the function prin-ciple of each module is presented. By building the testing environment,the feasibility of the new network communication protocol is veri-fied.

相似文献/References:

[1]严华 蔡瑞英.即时通信监控系统的设计与实现[J].计算机技术与发展,2009,(07):242.
 YAN Hua,CAI Rui-ying.Design and Implementation of Monitoring System of Instant Messaging[J].,2009,(01):242.
[2]李生 邓一贵 唐学文 潘磊 林玉香.基于移动代理的分布式入侵检测系统的研究[J].计算机技术与发展,2009,(09):132.
 LI Sheng,DENG Yi-gui,TANG Xue-wen,et al.Research of Mobile Agent - Based Distributed Intrusion Detection System[J].,2009,(01):132.
[3]潘晓君.基于缓存超时的ARP欺骗攻击协议的研究[J].计算机技术与发展,2009,(10):167.
 PAN Xiao-jun.Research of ARP Spoofing Attack Protocol Based on Cache Overtime[J].,2009,(01):167.
[4]彭云峰 沈明玉.入侵防御系统在应急平台网络中的应用研究[J].计算机技术与发展,2009,(02):162.
 PENG Yun-feng,SHEN Ming-yu.Research on Intrusion Prevention System for Emergency Response Network[J].,2009,(01):162.
[5]尚占锋 章登义.DDoS防御机制研究[J].计算机技术与发展,2008,(01):7.
 SHANG Zhan-feng,ZHANG Deng-yi.Research of DDoS Defense Mechanism[J].,2008,(01):7.
[6]涂溢彬 饶云波[] 廖云 周明天.蜜网系统在检测新型Rootkit中的应用[J].计算机技术与发展,2008,(01):181.
 TU Yi-bin,RAO Yun-bo,LIAO Yun,et al.Honeynet System Applied in New Pattern Rootkit[J].,2008,(01):181.
[7]邵晓宇 杨善林 褚伟.基于Linux入侵检测动态防火墙的设计与实现[J].计算机技术与发展,2008,(05):156.
 SHAO Xiao-yu,YANG Shan-lin,CHU Wei.Design and Implementation of Dynamic Intrusion Detection Firewall Based on Linux[J].,2008,(01):156.
[8]孙印杰 王敏 陈智芳.解析蜜罐技术在网络安全中的应用[J].计算机技术与发展,2008,(07):129.
 SUN Yin-jie,WANG Min,CHEN Zhi-fang.Analysis Honeypot Technology Application in Network Security[J].,2008,(01):129.
[9]曹莹莹 王绍棣 王汝传 张伟.恶意代码传播效果的控制技术研究[J].计算机技术与发展,2010,(08):128.
 CAO Ying-ying,WANG Shao-di,WANG Ru-chuan,et al.Research on Malware Code Propagation Effect Control Technology[J].,2010,(01):128.
[10]潘文婵 章韵.路由器访问控制列表在网络安全中的应用[J].计算机技术与发展,2010,(08):159.
 PAN Wen-chan,ZHANG Yun.Application of Access Control List on Router in Network Security[J].,2010,(01):159.
[11]杨锋英[],刘会超[][]. 面向多平台的日志远程采集系统研究[J].计算机技术与发展,2014,24(07):149.
 YANG Feng-ying[],LIU Hui-chao[][]. Research on Remote Log Collection System for Multi-platform[J].,2014,24(01):149.
[12]吴红星,王浩. 企业内网安全研究与应用[J].计算机技术与发展,2015,25(09):154.
 WU Hong-xing,WANG Hao. Research and Application of Enterprise Intranet Security[J].,2015,25(01):154.
[13]张公让,万飞. 基于网格搜索的 SVM 在入侵检测中的应用[J].计算机技术与发展,2016,26(01):97.
 ZHANG Gong-rang,WAN Fei. Application of Support Vector Machine in Network Intrusion Detection Based on Grid Search[J].,2016,26(01):97.

更新日期/Last Update: 2017-04-01