• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2011, Vol. 33 ›› Issue (8): 39-44.

• 论文 • 上一篇    下一篇

关于网络准入控制系统的分析与优化

于微伟1,卢泽新2,康东明1,吴建国1   

  1. (1.中国电子设备系统工程公司网络研究中心,北京 100141;
    2.国防科学技术大学计算机学院,湖南 长沙 410073)
  • 收稿日期:2009-11-24 修回日期:2010-03-28 出版日期:2011-08-25 发布日期:2011-08-25
  • 作者简介:于微伟(1983),男,安徽天长人,硕士,助理工程师,研究方向为计算机网络体系结构和网络安全技术。卢泽新(1963),男,湖北黄岗人,硕士,研究员,研究方向为计算机网络体系结构、网络协议技术和网络安全技术。康东明(1978),男,河南西平人,硕士,工程师,研究方向为计算机网络、数据存储和容灾备份。吴建国(1963),男,浙江温岭人,硕士,高级工程师,研究方向为计算机网络、数据存储和容灾备份。

On the Analysis and Optimization of  Network Admission Control Systems

YU Weiwei1,LU Zexin2,KANG Dongming1,WU Jianguo1   

  1. (1.Network Research Center,Institute of China Electronic Equipment System Engineering Company,Beijing 100141;
    2.School of Computer Science,National University of Defense Technology,Changsha 410073,China)
  • Received:2009-11-24 Revised:2010-03-28 Online:2011-08-25 Published:2011-08-25

摘要:

网络和信息系统在现代社会中扮演着越来越重要的作用,政府、企业的应用层次不断深入,用户的网络应用也逐渐增多,其中网络安全问题一直是困扰网络管理和维护者的首要问题。业界也针对这个问题提出了相应的解决方案,多家厂商推出的网络准入控制系统在一定程度上提高了网络的安全性,缓解了网络维护人员的压力。但是,在资源管理和行为审计方面还显得力不从心,有待进一步加强。本文首先分析业界具有代表性的两种网络准入控制系统,并对需要改进的地方提出优化方案。在优化方案中,将重点进行网络资源管理系统的系统组成机制和业务处理流程分析,以及行为审计的功能设计和处理过程描述。

关键词: 网络准入控制, 接入认证, 审计服务, 基础信息数据库

Abstract:

Networks and information systems are now playing more and more important roles in modern society. The network security problem about the system is the chief question which puzzles network managers all the while. The IT industry has brought out the related resolution schemes for this question. The network admission control system developed by several manufacturers can improve network security and reduce network managers’ stress to a certain extent. But in some aspects, the systems look not so funtional and effective, which needs to be enhanced. This article first analyzes the two representative network admission systems, and then gives the optimization project for their flaws. In the optimization project, the resources management system and process procedures will be analyzed, and the function design of the behavior audit and process will be described.

Key words: network admission control;access authentication;audit service;basic information database