Research on Security Solutions of Softswitch Network Based on IPSec

Article Preview

Abstract:

This paper introduces a typical softswitch network systems, analyzes security threats that may exist of softswitch network. For these security issues, we propose a solution that can operate with IPSec system as the core on the basis of the existing softswitch network. Which will helpfully solve the illegal terminal access, network attacks, virus threats and other security issues and enhance the security of softswitch network.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

1660-1663

Citation:

Online since:

November 2013

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Puyang Yu, Guosheng Kang. Research and Development of Trusted Computing [J]. COMPUTER TECHNOLOGY AND DEVELOPMENT, 2011, 21 (8): 235.

Google Scholar

[2] Shengzhao Huang, Zhao Hui, Zhonggui Bao. Study and Research on Technologies of Network Isolation [J]. Communications Technology, 2010, 43 (5) : 100-101.

Google Scholar

[3] Zhou Xin, Lujing Tao. Trusted Computing and Its Application in Information Systems [J]. Command Information System and Technology, 2012, 2 (2) : 29-30.

Google Scholar

[4] Shengzhao Huang, Zhao Hui, Zhonggui Bao. New Method of Internet Security Isolation Technology of Military Integrated Information System [J]. Journal of Spacecraft TT & C Technology, 2010, 29 (5) : 96-97.

Google Scholar

[5] Daqing Pang, Aike Zhang, Cuilan Xie. Realization Proposal and Security Model of Operating System Based on Credible Computation [J]. JOURNAL OF LIUZHOU VOCATIONAL & TECHNICAL COLLEGE, 2011, 11 (4) : 52-53.

Google Scholar

[6] Yang Bei, Zhenqiang Wu, Xiaobo Yang. Multi-level security model based on trusted computing Computer Engineering and Applications [J]. Computer Engineering and Applications, 2011, 47 (27) : 122-123.

Google Scholar

[7] Jingjing Sun, Cai Mian, Zhao Yang. Based on Trusted Computing User Security Model for Cloud Computing [J]. Computer security, 2012, (4) : 19-20.

Google Scholar

[8] Yanwei Zhou, Zhenqiang Wu, Zirui Qiao. Things Information Transport Protocol for IOT Based on Trusted Computing [J]. Computer Engineering, 2010, 36 (17) : 81-82.

Google Scholar