Title :
A Security Architecture for Intranet Based on Security Area Division
Author :
Fuxiang, Gao ; Sha, Li ; Xiaolu, Wang ; Lan, Yao
Author_Institution :
Coll. of Inf. Sci. & Eng., Northeastern Univ. (NEU), Shenyang, China
Abstract :
Aiming at the security requirement of the Intranet that is different from Internet, an security architecture for Intranet is proposed. In physical layer and data link layer, based on network switch the intranet is divided into several parts separated from each other as required. In network layer, making use of the NAT gateway integrated in virtual server the intranet or its part is hidden to ensure its security, and at the same time the other part of the intranet can securely access to the part of hidden resources. Using reliable IP address management and distribution mechanism the IP addresses are kept from being stolen or abused. In application layer, using bi-directional proxy server each part of the Intranet is separated, but the hosts can access each other based on application and user authority. The security switches are used to connect each separate part of the Intranet, based on application as well as user authorization control to carry out network access control. The security architecture focuses on security guarantee of intranet inside the traditional network boundary, and provides foundation framework to Intranet security which can ensure the reliability, usability, confidentiality, integrity, and maneuverability of the Intranet.
Keywords :
IP networks; Internet; authorisation; computer network management; computer network security; data integrity; data privacy; intranets; network servers; telecommunication switching; IP address management; Internet; Intranet confidentiality; Intranet integrity; Intranet maneuverability; Intranet reliability; Intranet usability; NAT gateway; bi-directional proxy server; data link layer; distribution mechanism; intranet; network access control; network switch; physical layer; security architecture; security area division; security switch; user authorization control; virtual server; Access control; Authorization; Bidirectional control; Data security; Internet; Network address translation; Network servers; Physical layer; Switches; Web server; Bi-directional Pro; IP Address Management; NAT Gateway; Network Security;
Conference_Titel :
Intelligent Information Technology and Security Informatics (IITSI), 2010 Third International Symposium on
Conference_Location :
Jinggangshan
Print_ISBN :
978-1-4244-6730-3
Electronic_ISBN :
978-1-4244-6743-3
DOI :
10.1109/IITSI.2010.33