Design and Implementation of Authentication Server with High Concurrency

2013 ◽  
Vol 834-836 ◽  
pp. 1791-1794
Author(s):  
Qi Xiong ◽  
Xiao Feng He ◽  
Jie Tang

With increasing problems of network security, a server with high concurrency is designed here to deal with identity authentication. In the general design of the server, RSA and DES algorithm are used. RSA algorithm is used to encrypt or decrypt users identity information. DES algorithm is used to ensure the information will not be stolen. In order to ensure the server has high concurrency, the technology of epoll and thread pool is applied to design the server in the Linux system. In the end , integration testing and stress testing are performed to test its reliability and stability. The testing result shows that the server can run properly under heavy concurrent load.

2013 ◽  
Vol 433-435 ◽  
pp. 1597-1602
Author(s):  
Jian Shi ◽  
Song Deng ◽  
Wei Min Lin ◽  
Tao Zhang ◽  
Yuan Yuan Ma ◽  
...  

The firewall is one of the most important network security facility and is widely used as a base infrastructure in a large enterprise network. When policy changes, the administrator must find all the potential conflicts between existing policies to ensure network security. That's a waste of time and energy. Proceeding from the demands, this paper analyzes key points and difficulties in the design process for the tools, applies mature algorithm of policy conflict detection, and finally proposes a flexible and scalable design. The prototype system proves that the tool does effectively detect all conflicts in policy set, and in the form of reports for the administrator.


2014 ◽  
Vol 644-650 ◽  
pp. 3283-3286 ◽  
Author(s):  
Shun Qing Wang ◽  
Hai Yan Chen

Being important in the field of network security, it is essential to study the firewall technology that has been an indispensable part of computer networks. This paper describes a new design and implementation of ASIC firewall architecture based on the state detection technology. Implementation and measurements in a real network show that the proposed system can provide high performance with reliability, flexibility, and security.


Sign in / Sign up

Export Citation Format

Share Document