[1]吴红星,王浩. 企业内网安全研究与应用[J].计算机技术与发展,2015,25(09):154-158.
 WU Hong-xing,WANG Hao. Research and Application of Enterprise Intranet Security[J].,2015,25(09):154-158.
点击复制

 企业内网安全研究与应用()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年09期
页码:
154-158
栏目:
安全与防范
出版日期:
2015-09-10

文章信息/Info

Title:
 Research and Application of Enterprise Intranet Security
文章编号:
1673-629X(2015)09-0154-05
作者:
 吴红星王浩
 合肥工业大学 计算机与信息学院
Author(s):
 WU Hong-xing;WANG Hao
关键词:
 企业内网无线网络网络安全实名绑定
Keywords:
 enterprise intranet wireless networknetwork securityreal-name binding
分类号:
TP393.1
文献标志码:
A
摘要:
 针对当前企业内网中常见的一些安全问题进行了研究,特别是针对企业无线局域网应用中遇到的新问题进行了分析,查阅相关文献发现现有研究仅在安全域层面提出对策。文中重点对企业内网中的无线网络安全进行分析研究,梳理了企业内网中无线网络建设与使用风险方面的几种类型,找出潜在风险,提出了以网络建设的基础规范为切入点,从根本上解决无线网络安全中的一系列问题,实现企业有线网络、无线网络以及有线和无线混合网络的安全管理。通过精细化的网络管理,对网内IP、交换机Port、终端MAC实行实名分配和绑定,按照企业内部的功能要求,通过在核心层实现严格的VLAN划分和端口准入数配置,实行安全域的访问控制。无线接入点实行动态密码更新,MAC地址自动获取认证,IP可控分配,实现无线设备准入控制。通过行为插件激活无线热点发现来制止USB随身WIFI自建非法AP,消除对企业内网的安全威胁。并验证了解决方案的有效性。
Abstract:
 Study some security problems in the enterprise Intranet in this paper,especially about the new problems in the enterprise wire-less LAN application,found that some countermeasures are put forward only in the aspect of security domain according to existing litera-ture review research. Mainly analyze wireless network security in enterprise networks in this paper,combed several types of the enterprise Intranet wireless network construction and using risks,tried to identify potential risk,made network construction basic specification as the breakthrough point,solved a series of wireless network security problems fundamentally,realized the security management for enterprise wired network,wireless network,as well as the wired and wireless mixed network. Through intensification of network management,inter-nal network IP,interchanger port,terminal MAC are all implemented real-name allocation and binding. Implement strict VLAN division and port access number configuration in core layer,to achieve the access control security domain according to the functions of the enter-prise. Realize wireless access point dynamic password updating,MAC address automatic access authentication,IP address controlled to al-location,wireless device access control. Also through behavior plug-in to activate wireless hot spots,prohibit the USB WIFI self-built il-legal AP,eliminating network security threats to the enterprise. Also verify the effectiveness of the solution.

相似文献/References:

[1]甘丽,胡昊[].中小企业内网安全管理的研究与实现[J].计算机技术与发展,2013,(08):122.
 GAN Li[],HU Hao[].Research and Implementation of SME Network Security Management[J].,2013,(09):122.
[2]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(09):1.
[3]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(09):5.
[4]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(09):13.
[5]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(09):21.
[6]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(09):25.
[7]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(09):29.
[8]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(09):34.
[9]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(09):38.
[10]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(09):43.

更新日期/Last Update: 2015-10-16