Network Security Defense-in-Depth Architecture based on Virturalization Technology
碩士 === 國立交通大學 === 資訊學院碩士在職專班資訊組 === 99 === In this paper, we propose a solution “Network Security Defense-in-Depth Architecture based on Virtualization Technology” that can effectively reduce cost of the deployment of defense in depth and increase the usage of computer resources. Further, this paper...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/17972736095958462172 |
id |
ndltd-TW-099NCTU5392016 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099NCTU53920162015-10-13T20:37:09Z http://ndltd.ncl.edu.tw/handle/17972736095958462172 Network Security Defense-in-Depth Architecture based on Virturalization Technology 植基於虛擬化技術之網路安全縱深防禦架構 Lee, Chang-Lin 李長霖 碩士 國立交通大學 資訊學院碩士在職專班資訊組 99 In this paper, we propose a solution “Network Security Defense-in-Depth Architecture based on Virtualization Technology” that can effectively reduce cost of the deployment of defense in depth and increase the usage of computer resources. Further, this paper will also compare their advantages and disadvantages for the traditional defense in depth architecture, Unified threat management and our solution. While also analysis their network performance. We hope this paper can provide a contribution in virtualization network security research and the defense in depth research. Tsai, Wen-Nung 蔡文能 2011 學位論文 ; thesis 91 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 資訊學院碩士在職專班資訊組 === 99 === In this paper, we propose a solution “Network Security Defense-in-Depth Architecture based on Virtualization Technology” that can effectively reduce cost of the deployment of defense in depth and increase the usage of computer resources. Further, this paper will also compare their advantages and disadvantages for the traditional defense in depth architecture, Unified threat management and our solution. While also analysis their network performance. We hope this paper can provide a contribution in virtualization network security research and the defense in depth research.
|
author2 |
Tsai, Wen-Nung |
author_facet |
Tsai, Wen-Nung Lee, Chang-Lin 李長霖 |
author |
Lee, Chang-Lin 李長霖 |
spellingShingle |
Lee, Chang-Lin 李長霖 Network Security Defense-in-Depth Architecture based on Virturalization Technology |
author_sort |
Lee, Chang-Lin |
title |
Network Security Defense-in-Depth Architecture based on Virturalization Technology |
title_short |
Network Security Defense-in-Depth Architecture based on Virturalization Technology |
title_full |
Network Security Defense-in-Depth Architecture based on Virturalization Technology |
title_fullStr |
Network Security Defense-in-Depth Architecture based on Virturalization Technology |
title_full_unstemmed |
Network Security Defense-in-Depth Architecture based on Virturalization Technology |
title_sort |
network security defense-in-depth architecture based on virturalization technology |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/17972736095958462172 |
work_keys_str_mv |
AT leechanglin networksecuritydefenseindeptharchitecturebasedonvirturalizationtechnology AT lǐzhǎnglín networksecuritydefenseindeptharchitecturebasedonvirturalizationtechnology AT leechanglin zhíjīyúxūnǐhuàjìshùzhīwǎnglùānquánzòngshēnfángyùjiàgòu AT lǐzhǎnglín zhíjīyúxūnǐhuàjìshùzhīwǎnglùānquánzòngshēnfángyùjiàgòu |
_version_ |
1718048900962582528 |