1、 中文 8169 字 本科毕业设计 文献翻译 题 目 IP 协议 及 IPSec 协议安全分析 学生姓名 专业班级 计算机科学与技术 2003-1 班 学 号 56 院 (系 ) 计算机与通信工程学院 指导教师 ) 完成时间 2007 年 6 月 6 日 1 英文原文 The Analysis Of IP and IPSec Protocols Security Problem 1. OSI model in time for TCP/IP protocol Overview 1.1 OSI model in time for TCP/IP protocol introduce It was
2、repose International Organization for Standardization suggest to whereas extend arisen, it broke into seven layer into to that OSI model (open system interconnection reference model). The overdone bulkiness, intricacy incur know clearly heap criticism of the is ISO constitutive OSI reference model.
3、As shown in the following chart Application layer Application layer Presentation layer Session layer Transport layer Transport layer Network layer Network layer Data link layer Network interface layer Physical layer Graphic 1.1 OSI model and TCP/IP model The practical application sense nope very lar
4、ge, thereof forsooth toward fathom network protocol interior wield did very avail out of the refer to network cannot but talk OSI reference model, notwithstanding OSI reference model. In reins network world liner, TCP/IP protocol suite obtain know clearly still for extensive application. These OSI s
5、even layer model suffer, per layer big city provide thereon thickness with, combine one visit mouthpiece or interface. The homology hierarchy entitled peer layer of the differ mainframe of compartment. Stand for and mainframe B menses presentation layer each other for 2 peer layer, mainframe A mense
6、s session layer and mainframe B menses session layer each other for peer layer grade among as if mainframe A. Session layer and stand for (these double-deck function by merge to application layer realize) among at TCP/IP reference model suffer, take out know clearly OSI reference model. 1.2 TCP/IP p
7、resence frangibility It was run low of virtual security authentication and crypto system, there into up most factor namely IP address problem that IP layered major defect. R command , NFS, X window grade big city is repose IP address versus user proceed authentication and authorization to among that
8、 of TCP/IP protocol with IP address came by way of network node alone one identification, heap TCP/IP serve, include Berkeley. Source IP address estimation compact technique authenticity and security among both that of currently TCP/IP cellular security mechanism primarily repose IP address WRAPT fi
9、ltration(packet filtering) and authentication (authentication) technology, its validity incarnate at could warranty IP WRAPT. The shield, sans versus IP fold misogyny IP address authenticity authentication mechanism and security measure in of whereas IP address lie heap problem, consultative maxima
10、shortcoming namely sans versus IP address. The shield, sans versus IP fold misogyny IP address authenticity authentication mechanism and security measure in of whereas IP address lie heap problem, consultative maxima shortcoming namely sans versus IP address. It was repose IP protocol of last, TCP s
11、ubsection and UDP protocol data packet is encapsulation be on the security menace of IP WRAPT suffer at network upper Tran missive, wherefore sameness be confronted with IP layer station encounter that owing to UDP. Now that people all the while in thought method set, yet still avoid less namely as
12、per TCP tie hour in at rest thrice handshake Machine-made attack. Either these attack summarize arisen include: One: source address cheat(source address spoofing) or IP cheat(IP spoofing); Two: source routing select cheat(source routing spoofing); Three: rip attack(rip attacks); Four: discriminate attack(authentication attacks);