信息安全研究 ›› 2020, Vol. 6 ›› Issue (4): 338-344.

• 远程办公安全专题 • 上一篇    下一篇

不同安全等级网络之间的数据交换方案研究与实现

赵荣康,孔祥瑞,梁蓉蓉   

  1. 中铁信安(北京)信息安全技术有限公司
  • 收稿日期:2020-04-06 出版日期:2020-04-03 发布日期:2020-04-06
  • 通讯作者: 赵荣康
  • 作者简介:赵荣康 注册信息安全专员.主要研究方向为 zhaorongkang@sinorail.com 孔祥瑞 注册信息安全专员. 主要研究方向为 kongxiangrui@sinorail.com 梁蓉蓉 注册信息安全专员. 主要研究方向为 liangrongrong@sorail.com

Research and Implementation of Data Exchange Scheme Between Different Security Level Networks

  • Received:2020-04-06 Online:2020-04-03 Published:2020-04-06

摘要: 在信息化高速发展的时代,以互联网为代表的网络已深入渗透到各行各业,在享受互联网所带来便利的同时,网络黑客入侵、恶意代码攻击、病毒感染等安全风险时刻威胁着各种与其相连网络的安全,而目前安全市场上主流的安全防护产品如:防火墙、防病毒和入侵检测等基本都是基于先知经验不断累积的特征库或情报库去匹配及应对已知的安全威胁,面对高速发展的“黑产”,不断升级变化的网络恶意攻击,这些传统防御手段并不能够及时有效的确保网络安全.随着网络安全隔离与数据安全交换技术的出现及发展,通过基于网闸、光闸、光盘刻录摆渡、数据单向摆渡系统的部署实施,在不同安全等级网络之间建立科学、合规的连接途径,并根据应用场景完成数据的安全交换,有效解决了不同安全等级网络之间的连接以及数据安全交换的问题.

关键词: 不同安全等级网络数据交换, 网络安全隔离与信息交换技术, 网闸, 光闸, 数据单向摆渡, 光盘刻录摆渡

Abstract: In the era of rapid development of information technology, the network represented by the Internet has penetrated into all walks of life. While enjoying the convenience brought by the Internet, the security risks such as hackers' invasion, malicious code attack and virus infection threaten the security of various connected networks at all times. At present, the mainstream security protection products in the security market, such as firewall, anti-virus and access Intrusion detection is basically based on the feature base or intelligence base accumulated by the prophet's experience to match and respond to known security threats. In the face of the rapid development of "black production" and the constantly upgrading of network malicious attacks, these traditional defense methods can not ensure the network security in time and effectively. With the emergence and development of network security isolation and data security exchange technology, through the deployment and implementation of the one-way ferry system based on the network gate, optical gate, CD-ROM recording ferry and data, a scientific and compliant connection way is established between different security level networks, and the data security exchange is completed according to the application scene, which effectively solves the connection between different security level networks Data security exchange.

Key words: different security level network data exchange, network safe isolation and information exchange technology, gap, light gate, data one-way ferry