Paper
15 July 2008 A case of reliable remote functionality
Author Affiliations +
Abstract
All data are provided by Huairou Solar Observing Station (HSOS), Beijing, China, a main observation station that is designed to predicate solar activities and space environment in China. With the more and more complicated Internet environment, many security issues arise, such as viruses, attacks to potential security weakness in the network protocol, improperly using operation systems within a network etc., we have to design a more secure and reliable network architecture in order to implement remote functionalities to meet the demands of the data users: automatic data transmission, remote observation, control and maintenance of various systems. In this article, the author presents a real case discussing various aspects while implementing it, that includes a new network topology changed from an original architecture to a more secure one, the selections of the secure products, secure strategies deployment, the problems encountered during operation and the solutions in use at HSOS. The article also gives some inputs from the author's experiences of the network security. The case is implemented in the entire observing station, which includes multiple observing systems, at HSOS.
© (2008) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Ganghua Lin "A case of reliable remote functionality", Proc. SPIE 7019, Advanced Software and Control for Astronomy II, 70192Y (15 July 2008); https://doi.org/10.1117/12.789090
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Computer security

Local area networks

Information security

Computing systems

Network architectures

Operating systems

RELATED CONTENT

Considerations and foundations for Botnet simulation
Proceedings of SPIE (April 13 2009)
Honeynets
Proceedings of SPIE (February 21 2001)
Routing architecture and security for airborne networks
Proceedings of SPIE (April 29 2009)
Bot armies as threats to network security
Proceedings of SPIE (April 09 2007)
Internet firewalls: questions and answers
Proceedings of SPIE (March 12 1996)

Back to Top