期刊文献+

网络疑似入侵环境下的最优接口访问控制模型仿真 被引量:3

Simulation of Optimal Interface Access Control Model in Network Suspected Intrusion
下载PDF
导出
摘要 在网络疑似入侵环境下通过最优接口访问控制实现网络入侵的可靠性拦截,保障网络安全;传统方法采用自由链路分散控制模型进行网络入侵检测和接口访问控制,在受到较大的特征干扰下,入侵访问控制和拦截性能不好;提出一种基于自适应循环堆栈接口调度的网络疑似入侵环境下的最优接口访问控制模型;进行接口访问控制模型总体设计及组件模块分析,接口访问控制系统包括通信库、协议库、核心控制库和资源库,采用小波包自适应波束调制方法进行入侵检测算法设计,作为接口访问控制系统软件核心;通过SDICmdCon寄存器设置网络疑似入侵环境下的最优接口的内核,在嵌入式Linux环境下通过自适应循环堆栈接口调度实现接口访问控制的软件开发;仿真结果表明,采用该模型进行网络入侵检测,准确检测性能较好,通过最优接口访问控制,实现对网络入侵数据的准确识别和拦截。 In the network environment, the reliability of network intrusion is intercepted by the optimal interface access control, which can ensure the network security. In the traditional method, the free link distributed control model is used in the network intrusion detection and interface access control, which is not good for the intrusion access control and the interception performance under the interference of the larger features. An optimal interface access control model based on adaptive loop stack interface scheduling in the network is proposed. Interface analysis of access control model of the overall design and module and interface to access control system includes a communication library, protocol library, core control and resource libraries, using wavelet packet adaptive beam modulation method for intrusion detection algorithm design, as interface access control system is the core of the software. By setting up the optimal interface of the network in the SDICmdCon register, the software development of the interface access control is realized through the adaptive loop stack interface in the embedded Linux environment. The simulation results show that the model is used for network intrusion detection, accurate detection performance is better, through the optimal access control, to achieve the accurate identification and interception of network intrusion data.
作者 刘珏 王永
出处 《计算机测量与控制》 2016年第11期182-184,188,共4页 Computer Measurement &Control
关键词 网络入侵 网络安全 接口访问 控制 仿真 network intrusion network security interface access control simulation
  • 相关文献

参考文献6

二级参考文献59

  • 1张维明,毛捍东,陈锋.一种基于图论的网络安全分析方法研究[J].国防科技大学学报,2008,30(2):97-101. 被引量:9
  • 2张涛,胡铭曾,云晓春,张永铮.计算机网络安全性分析建模研究[J].通信学报,2005,26(12):100-109. 被引量:41
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 4Gross J,Janke W,Banchmann M.Massively parallelized replica-exchange simulations of polymers on GPUs [J].Comput.Phys.Comm.,2011,182:1638-1644.
  • 5Bimal K M, Gholam M A. Differential epidemic model of virus and worms in computer network [J]. International Journal of Network Security,2012,14(3) : 149-155.
  • 6Li Hong, Qian Chang-j i, Sun Li-zhen, et al. Simulation of a flexi- ble polymer tethered to a flat adsorbing surface [J]. Journal of Applied Polymer Science, 2012,124 : 282-287.
  • 7Zhu Q Y, Yang X F, Yang L X, et al. Optimal control of computer virus under a delayed model [J]. Applied Mathematics and Com putation, 2012,218(23) : 11613-11619.
  • 8PONGPAIBOOL P, DOVERSPIKE R, ROUGHAN M, et al. Handling IP traffic surges via optical layer reconfiguration [C]// OFC 2002: Proceedings of the 2002 Optical Fiber Communication Conference and Exhibit. Piscataway: IEEE, 2002: 427-428.
  • 9MARKOPOULOU A, IANNACCONE G, BHATTACHARYYA S, et al. Characterization of failures in an operational IP backbone network [J]. IEEE/ACM Transactions on Networking, 2008, 16(4): 749-762.
  • 10PEI D, WANG L, MASSEY D, et al. A study of packet delivery performance during routing convergence [C]// Proceedings of the 2003 International Conference on Dependable Systems and Networks. Piscataway: IEEE, 2003: 183-192.

共引文献157

同被引文献24

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部