期刊文献+

多点接入集群防火墙系统及协作数据检查算法

The Research of Clan Firewall System and Cooperative Data Checking Algorithm
下载PDF
导出
摘要 分析评价了现有的防火墙模型的缺陷和网络高速发展出现的新问题,提出了一种新的防火墙模型,并给出了其功能模块的划分及工作算法,解决了多个安全域的多接入点网络的安全规则的实施问题,指出了此种方案性价比高、易于实现、系统强健、安全性和可管理性强的优点。 This paper analyses and evaluates the limitation of current firewall model and new problem brought by fast developing of network,puts forward a new firewall model,presents its function partition and working algorithm,solves the security rules implementing of the multi-security-domains multi-access network.Furthermore,it indicates the virtues of high performance,low coast,easy to implementing,high robust and high security,manageable of this scheme.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第22期160-163,共4页 Computer Engineering and Applications
关键词 网络安全 防火墙 多点接入 集群 network security, firewall, multi-access, clan
  • 相关文献

参考文献6

  • 1Li li-qiu,George Varghese,Subhash Suri. Fast Firewall Implementations for Software and Hardware based Routers[C ].In :Proceeding of ACM SIGMETRICS,Cambridge MA USA,2001.
  • 2董剑安,王永刚,吴秋峰.iptables防火墙的研究与实现[J].计算机工程与应用,2003,39(17):161-163. 被引量:24
  • 3Sotiris Ioannidis,Angelos D Keromytis,Steve M Bellovin et al. Implementing a Distributed Firewall [ C ].In : Proceeding of CCS' 00, Athens Greece, 2000.
  • 4Marcus Goncalves,Steven Brown.Check Point Firewall-1 Administration Guide[M].McGraw-Hill Professional,2000.
  • 5Douglas E Comer. Internetworking With TCP/IP Vol. Ⅰ:Principles,Protocols,and Architecture [ M ].Third Edition, Prentice Hall, 1998.
  • 6翁广安,余胜生,周敬利.一种基于状态监测的防火墙[J].计算机工程,2004,30(2):144-145. 被引量:3

二级参考文献8

  • 1阮戈.Linux应用实例与技巧[M].北京:机械工业出版社,2001.436-454.
  • 2[1]Check Point Software Technologies Co. Ltd. Stateful Inspection Technology. http://www.cheekpoint.com/, 1999
  • 3[2]SYN Flooding and IP Spoofing Attacks. http://www.cert.org/advisories /CA-1996-21 .html, 1996
  • 4[3]Distributed Denial of Service Tools. http://www.cert.org/incident_notes /IN-99-07.html, 1999
  • 5[4]Postel J B, Reynolds J K. File Transfer Protocol (FTP). RFC 959, http://www. ietf. org/, 1985
  • 6[5]Noureldien N A,Osman I M.A Stateful Inspection Module Architecture. TENCON 2000, Proceedings, 2000, 2:259 -265
  • 7[6]Spitzner L. Understanding the FW-I State Table. http://www.enteract.com/~lspitz/fwtable.html, 2000-11
  • 8Chapter 18 : Firewalling with iptables.RedHat Linux7.2 :The Official RedHat Linux Reference Guide.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部