天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

基于Open vSwitch的可信交換機(jī)STP協(xié)議的可信改進(jìn)

發(fā)布時間:2018-05-19 10:29

  本文選題:STP + 網(wǎng)絡(luò)安全。 參考:《北京工業(yè)大學(xué)》2014年碩士論文


【摘要】:計(jì)算機(jī)網(wǎng)絡(luò)技術(shù)飛速發(fā)展和規(guī)模不斷擴(kuò)大的同時,也引來了無數(shù)互聯(lián)網(wǎng)安全問題,人們對網(wǎng)絡(luò)安全這一問題也越來越重視?尚啪W(wǎng)絡(luò)成為近年來網(wǎng)絡(luò)安全領(lǐng)域的研究熱點(diǎn)。將可信與傳統(tǒng)網(wǎng)絡(luò)結(jié)合,勢必為網(wǎng)絡(luò)安全提供更好的安全保障,可信網(wǎng)絡(luò)必將不斷發(fā)展并有望在未來取代傳統(tǒng)網(wǎng)絡(luò)。 以太網(wǎng)是當(dāng)今最流行的局域網(wǎng)技術(shù)。隨著以太網(wǎng)業(yè)務(wù)的不斷發(fā)展,人們對以太網(wǎng)安全也越來越重視,對網(wǎng)絡(luò)自愈功能的要求也越來越高。生成樹協(xié)議(STP)是以太網(wǎng)交換機(jī)運(yùn)行的主要協(xié)議之一,其目的是用來解決交換拓?fù)渲械奈锢砣哂喈a(chǎn)生的問題。當(dāng)網(wǎng)絡(luò)出現(xiàn)環(huán)路時,STP會動態(tài)的建立一棵生成樹,使冗余鏈路處于阻塞狀態(tài),從而抑制廣播風(fēng)暴等問題。而當(dāng)網(wǎng)絡(luò)出現(xiàn)故障時,冗余鏈路又可以馬上從阻塞狀態(tài)轉(zhuǎn)到激活狀態(tài),代替失效的主鏈路正常工作。 交換機(jī)通過相互交換網(wǎng)橋協(xié)議數(shù)據(jù)單元(BPDU)的方式進(jìn)行信息交換,從而建立生成樹。每臺交換機(jī)都擁有一個唯一的身份標(biāo)示:網(wǎng)橋ID(BID),具有最小BID的交換機(jī)將被選舉為根網(wǎng)橋。由于這個特性,攻擊者可以偽裝成具有最小BID的交換機(jī),,成為根網(wǎng)橋,從而窺探網(wǎng)絡(luò)流量,發(fā)起網(wǎng)絡(luò)攻擊,這種攻擊被稱為根接管攻擊(root take-over attack)。當(dāng)網(wǎng)絡(luò)拓?fù)浒l(fā)生變化時,生成樹需重計(jì)算,這容易造成攻擊者的一些其他攻擊行為,如ID改變攻擊、沉默攻擊等。國外學(xué)者從三個方面闡述了生成樹協(xié)議的缺陷:1)缺少BPDU認(rèn)證機(jī)制;2)STP慢收斂;3)缺少根監(jiān)管。針對生成樹協(xié)議的攻擊也暴露了鏈路層網(wǎng)絡(luò)協(xié)議的不足,并將高層網(wǎng)絡(luò)至于危險(xiǎn)之中。盡管一些問題被研究多年,且不斷有學(xué)者提出解決方案,但仍舊存在很多問題。 為了增強(qiáng)2層網(wǎng)絡(luò)的安全及可信性,本文將可信網(wǎng)絡(luò)與傳統(tǒng)網(wǎng)絡(luò)結(jié)合,提出一種基于可信平臺的生成樹協(xié)議,旨在通過一個輕量級的認(rèn)證機(jī)制,達(dá)到局域網(wǎng)交換機(jī)的高可信性。如果正確的實(shí)施在每臺可信交換機(jī)上,可信STP的認(rèn)證機(jī)制可保證局域網(wǎng)中交換機(jī)對其他交換機(jī)聲明的拓?fù)湫畔⒌目尚判。為了?yàn)證改進(jìn)后的可信STP,本文還提出了一個可信評估模型,它通過使用基于規(guī)范的狀態(tài)機(jī)對STP進(jìn)行可信評估。本文通過在Open vSwitch上實(shí)現(xiàn)一個可信STP原型來對其進(jìn)行功能測試。實(shí)驗(yàn)表明,該可信STP協(xié)議能夠達(dá)到安全目標(biāo),并能在較低的計(jì)算負(fù)載和較好的收斂時間下有效的避免STP攻擊。
[Abstract]:With the rapid development and expansion of computer network technology, there are also numerous Internet security problems. People pay more and more attention to the problem of network security. In recent years, trusted network has become a research hotspot in the field of network security. The combination of trusted network and traditional network is bound to provide a better security guarantee for network security. Trusted network will continue to develop and is expected to replace the traditional network in the future. Ethernet is the most popular LAN technology nowadays. With the continuous development of Ethernet service, people pay more and more attention to Ethernet security, and the requirement of network self-healing function is higher and higher. Spanning Tree Protocol (STP) is one of the main protocols for Ethernet switch to solve the problem of physical redundancy in switching topology. When the network appears loop, STP will dynamically set up a spanning tree, make the redundant link in blocking state, so as to suppress the broadcast storm and other problems. When the network fails, the redundant link can be switched from blocking state to active state immediately, instead of the failure of the main link. Switches exchange information by exchanging data units of bridge protocol (BPDU) to establish spanning tree. Each switch has a unique identity: bridge ID ID, and the switch with the smallest BID will be elected as the root bridge. Because of this feature, an attacker can disguise himself as a switch with the smallest BID and become a root bridge to peek into network traffic and launch a network attack, which is called root take-over attack. When the network topology changes, the spanning tree needs to be recomputed, which can easily lead to some other attacks, such as ID change attack, silent attack and so on. Foreign scholars have explained the defects of spanning tree protocol from three aspects: 1) lack of BPDU authentication mechanism and 3) lack of root supervision. The attack against spanning tree protocol also exposes the deficiency of link layer network protocol and puts the high layer network in danger. Although some problems have been studied for many years and many scholars have put forward solutions, there are still many problems. In order to enhance the security and credibility of the two-layer network, this paper combines the trusted network with the traditional network, and proposes a spanning tree protocol based on trusted platform, which aims to achieve the high credibility of LAN switch through a lightweight authentication mechanism. If implemented correctly on each trusted switch, the authentication mechanism of trusted STP can guarantee the credibility of the topology information declared by the switch in LAN. In order to verify the improved trusted STP, this paper also proposes a trusted evaluation model, which uses a canonical state machine for trusted evaluation of STP. This paper implements a trusted STP prototype on Open vSwitch to test its function. Experiments show that the trusted STP protocol can achieve security goals and can effectively avoid STP attacks under lower computational load and better convergence time.
【學(xué)位授予單位】:北京工業(yè)大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP393.04;TP393.08

【參考文獻(xiàn)】

相關(guān)期刊論文 前1條

1 沈昌祥;張煥國;王懷民;王戟;趙波;嚴(yán)飛;余發(fā)江;張立強(qiáng);徐明迪;;可信計(jì)算的研究與發(fā)展[J];中國科學(xué):信息科學(xué);2010年02期



本文編號:1909753

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/guanlilunwen/ydhl/1909753.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶a294a***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com
91亚洲精品综合久久| 国产成人亚洲精品青草天美| 欧美美女视频在线免费看| 欧洲亚洲精品自拍偷拍| 亚洲国产一级片在线观看 | 日韩欧美二区中文字幕| 有坂深雪中文字幕亚洲中文| 手机在线观看亚洲中文字幕| av在线免费观看一区二区三区| 久热这里只有精品九九| 国产成人精品视频一区二区三区| 天海翼精品久久中文字幕 | 亚洲综合香蕉在线视频| 久久精品少妇内射毛片| 在线日本不卡一区二区| 亚洲熟妇熟女久久精品 | 色小姐干香蕉在线综合网| 中文字幕禁断介一区二区| 欧美午夜色视频国产精品| 高清在线精品一区二区| 精品日韩av一区二区三区| 免费黄片视频美女一区| 午夜精品成年人免费视频| 亚洲国产av在线观看一区| 在线中文字幕亚洲欧美一区| 日韩欧美一区二区亚洲| 老司机精品福利视频在线播放| 国产精品久久三级精品| 国产精品午夜性色视频| 日韩欧美综合在线播放| 少妇视频一区二区三区| 国产又粗又猛又爽又黄| 久草国产精品一区二区| 日韩一区二区三区在线日| 亚洲a级一区二区不卡| 色婷婷中文字幕在线视频| 国产欧美日产久久婷婷| 欧美激情一区二区亚洲专区| 日韩欧美国产三级在线观看| 亚洲综合精品天堂夜夜| 国产精品欧美在线观看|