Using IPSEC to Avoid Traffic Analysis
碩士 === 國立臺灣大學 === 資訊工程學研究所 === 88 === Communication is the heart of business. Using the Internet for a Virtual Private Network enables you to communicate securely among your offices - wherever they may be located-with greater flexibility and at a lower cost than using private networks set up with pr...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
1999
|
Online Access: | http://ndltd.ncl.edu.tw/handle/68002793320360720732 |
id |
ndltd-TW-088NTU00392052 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-088NTU003920522016-01-29T04:18:37Z http://ndltd.ncl.edu.tw/handle/68002793320360720732 Using IPSEC to Avoid Traffic Analysis 利用IPSEC達成封包傳輸隱匿之目的 Shieng-Ting Kao 高笙庭 碩士 國立臺灣大學 資訊工程學研究所 88 Communication is the heart of business. Using the Internet for a Virtual Private Network enables you to communicate securely among your offices - wherever they may be located-with greater flexibility and at a lower cost than using private networks set up with pre-Internet technologies, such as leased lines and modem banks. To address the issue of providing packet-level security in IP, the IETF has been working on the IPSEC protocols within their IP Security Working Group. In IPSEC protocol, it includes authentication, confidentiality and authority function. But it is not enough. Routing Information is exposed and it must be hidden. I design the enhanced mode to achieve this goal. Using trace-route protocol to find a path and then encrypt the IP header information with security gateway. After processing, the routing information is secure and the packet can avoid the traffic analysis. Jau-Hsiung Huang 黃肇雄 1999 學位論文 ; thesis 52 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 資訊工程學研究所 === 88 === Communication is the heart of business. Using the Internet for a Virtual Private Network enables you to communicate securely among your offices - wherever they may be located-with greater flexibility and at a lower cost than using private networks set up with pre-Internet technologies, such as leased lines and modem banks. To address the issue of providing packet-level security in IP, the IETF has been working on the IPSEC protocols within their IP Security Working Group. In IPSEC protocol, it includes authentication, confidentiality and authority function. But it is not enough. Routing Information is exposed and it must be hidden. I design the enhanced mode to achieve this goal. Using trace-route protocol to find a path and then encrypt the IP header information with security gateway. After processing, the routing information is secure and the packet can avoid the traffic analysis.
|
author2 |
Jau-Hsiung Huang |
author_facet |
Jau-Hsiung Huang Shieng-Ting Kao 高笙庭 |
author |
Shieng-Ting Kao 高笙庭 |
spellingShingle |
Shieng-Ting Kao 高笙庭 Using IPSEC to Avoid Traffic Analysis |
author_sort |
Shieng-Ting Kao |
title |
Using IPSEC to Avoid Traffic Analysis |
title_short |
Using IPSEC to Avoid Traffic Analysis |
title_full |
Using IPSEC to Avoid Traffic Analysis |
title_fullStr |
Using IPSEC to Avoid Traffic Analysis |
title_full_unstemmed |
Using IPSEC to Avoid Traffic Analysis |
title_sort |
using ipsec to avoid traffic analysis |
publishDate |
1999 |
url |
http://ndltd.ncl.edu.tw/handle/68002793320360720732 |
work_keys_str_mv |
AT shiengtingkao usingipsectoavoidtrafficanalysis AT gāoshēngtíng usingipsectoavoidtrafficanalysis AT shiengtingkao lìyòngipsecdáchéngfēngbāochuánshūyǐnnìzhīmùde AT gāoshēngtíng lìyòngipsecdáchéngfēngbāochuánshūyǐnnìzhīmùde |
_version_ |
1718167369619079168 |