首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机的应用论文--计算机网络论文--一般性问题论文

企业网络的安全策略和性能评估

Acknowledgement第5-6页
ABSTRACT第6页
摘要第7-12页
1 INTRODUCTION第12-20页
    1.1 BACKGROUND第12-14页
    1.2 PROBLEM STATEMENT第14-15页
    1.3 MOTIVATION第15-16页
    1.4 CONTRIBUTIONS第16页
    1.5 RESUME AND ORGANIZATION OF OUR WORK第16-20页
2 LITERATURE REVIEW第20-35页
    2.1 RELATED WORK第20-21页
    2.2 OBJECTIVES OF CYBER SECURITY AND FREQUENT ATTACKS第21-35页
        2.2.1 Confidentiality第22-32页
            2.2.1.1 Authentication第25-28页
            2.2.1.2 Authorization第28-31页
            2.2.1.3 Accounting第31-32页
        2.2.2 Integrity第32-33页
        2.2.3. Availability第33-35页
3 MODEL DESIGN第35-54页
    3.1 INTRODUCTION第35页
    3.2 OUR THEORETICAL APPROACH第35-38页
    3.3 OUR PRACTICAL APPROACH第38-54页
        3.3.1 Our Traffic Generator setting第39-41页
            3.3.1.1 Our Client Side settings第39-40页
            3.3.1.2 Our Server Side settings第40-41页
        3.3.2 Our Measurement Tool settings第41-42页
        3.3.3 Other tools and settings we used第42-46页
            3.3.3.1 Our hardware specification第42页
            3.3.3.2 Our software specifications and settings第42-46页
        3.3.4 Setting up a totally insecure Traffic第46-47页
        3.3.5 Setting up a traffic intercepted by an IOS firewall router第47-48页
        3.3.6 Setting up a traffic intercepted by a zone base firewall router第48-49页
        3.3.7 Setting up a site to site IPsec Traffic between routers第49-50页
        3.3.8 Setting up an IPsec over GRE Traffic Tunnel between routers第50-51页
        3.3.9 Setting up an IOS/IPS Traffic between hosts第51-52页
        3.3.10 setting up an IOS/IPS and IPsec over GRE between two hosts第52-53页
        3.3.11 Resume第53-54页
4 ANALYSIS OF OUR RESULTS第54-65页
    4.1 OUR EXPERIMENTAL RESULTS AND ANALYSIS第54-55页
    4.2 IMPACT OF SECURITY MECHANISMS ON PERFORMANCE OF OUR NETWORK第55-57页
    4.3 OUR STATISTICAL ANALYSIS第57-65页
        4.3.1 Descriptive Statistical of our Results第58页
        4.3.2 Analysis of Variance one way第58-60页
        4.3.3 Analysis of Variance two by two variable第60页
        4.3.4 Models Validation第60-61页
        4.3.5 Correlation Test第61-65页
5 SECURITY STRATEGY AND PERFORMANCE EVALUATION第65-72页
    5.1 PROPOSED ENTERPRISE CLASSIFICATION第65-66页
    5.2 PROPOSED SECURITY STRATEGY第66-70页
    5.3 PERFORMANCE EVALUATION OF OUR STRATEGY MODEL VS.THE EXITING第70-72页
6 CONCLUSION AND RECOMMENDATION第72-74页
    6.1 GENERAL CONCLUSION第72页
    6.2 RECOMMENDATION第72-74页
REFERENCES第74-79页
DATASET FOR THE MASTER'S THESIS第79-80页

论文共80页,点击 下载论文
上一篇:基于声发射技术的混凝土试件弯曲损伤研究
下一篇:电商逆向物流的配送时效与取件服务改进研究