Secure IP Network Model

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Mobile IP Communication

This paper describes a solution called Secure Mobile IP (SecMIP) to provide mobile IP users secure access to their company’s firewall protected virtual private network. The solution requires neither introducing new protocols nor to insert or modify network components. It only requires a slight adaptation of the end system communication software in order to adapt Mobile IP and IP Security protoc...

متن کامل

Secure Voice-over-IP

Voice-over-IP (VoIP) is one of the main applications or services, which dramatically increased the spread and usage of the Internet. VoIP describes the transmission and reception of voice and video data over networks that use the “internet protocol” (IP) as transport protocol. With the use of VoIP within company networks (intranet) investors hope to reduce the expenses for infrastructure and ma...

متن کامل

Secure Mobile IP with HIP Style Handshaking and Readdressing for public-key based IP network

Mobile IP allows a mobile node to roam into a foreign IP network without losing its connection with its peer. Mobile IPv6 uses Route Optimization to improve the routing performance by avoiding the triangle routing problem and adopting Return Routability as a secure process for binding update. Host Identity Protocol (HIP) is an experimental security protocol which provides mobility management an...

متن کامل

Selecting an ATM or IP Security Solution to Secure an IP over ATM Virtual Private Network

In 1999, the ATM Forum international consortium approved the first version of its ATM security specifications, whereas the Internet Engineering Task Force (IETF) published a series of IP security RFC. The aim of those documents is to protect communications over Asynchronous Transfer Mode (ATM) network, respectively the Internet Protocol (IP) network by offering data confidentiality, partners au...

متن کامل

An IP Traceback Model for Network Forensics

Network forensics deals with capture, recording, analysis and investigation of network traffic to traceback the attackers. Its ultimate goal is to provide sufficient evidence to allow the perpetrator to be prosecuted. IP traceback is an important aspect in the investigation process where the real attacker is identified by tracking source address of the attack packets. In this paper we classify ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computational Methods in Science and Technology

سال: 2013

ISSN: 1505-0602

DOI: 10.12921/cmst.2013.19.4.209-216