期刊文献+

netfilter技术分析及在入侵响应中的应用

An Analysis of Netfilter and Its Implementation in Active Response
下载PDF
导出
摘要 从netfilter总体结构入手,分析了netfilter的连线跟踪、包过滤、地址转换、包处理等关键技术。在此基础上,研究了入侵响应策略,提出了基于netfilter的主动响应模型。经测试证明,这种主动响应模型灵活高效,可以极大地增强系统对入侵行为的防御能力。 Netfilter is the framework inside the Linux 2.4.x kernel which enables packet filtering, network address translation (NAT) and other packet mangling. This paper begins with introduction to the framework of netfilter, and some key technology, such as the connection tracking, packet filtering, network address translation, and packet mangling are analyzes in detail. In addition, the strategy of response to intrusion is researched in this paper, and an active response model based on netfilter is given. Through the test proofed, the model could efficiently strengthen the system security.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2005年第1期94-96,共3页 Journal of University of Electronic Science and Technology of China
基金 国家863计划资助项目(2002AA142040)
关键词 连线跟踪 入侵响应 主动响应 入侵行为重定向 connection tracking response to intrusion active response intrusion redirect
  • 相关文献

参考文献3

  • 1姚晓宇,顾冠群.一种基于主动网的安全防御系统[J].计算机工程与应用,2002,38(6):130-133. 被引量:6
  • 2Rusty R. Linux 2.4 packet filtering HOWTO[EB/OL]. http://www. netfilter. org/documentation/HOWTO/packetfiltering-HOWTO.html, 2002-01-24.?A?A
  • 3Kemmerer R A, Vigna G.Intrusion detection: A brief history and overview[J]. Security & Privacy, IEEE Computer Magazine, 2002, 35(4): 27-30?A.

二级参考文献11

  • 1[1]James P Anderson. Computer Security Threat Monitoring and Surveillance[R].Tech report, 1980
  • 2[2]Dorothy E Denning. An intrusion-dection model[J].IEEE Transactions on Software Engineering, 1987;SE-13(2)
  • 3[3]L T Heberlein. A network security monitor. Symposium on Research in Security and Privacy, 1990
  • 4[4]S R Snapp. A system for distributed intrusion detection. IEEE Compcn 91
  • 5[5]S Staniford-Chen.GrIDS-A Graph based intrusion dection system for a large scale networks[C].In:National Information System Security Conference, 1996
  • 6[6]David Isacoff et al.An Architecture for Intrusion Dection using Autonomous Agents. COAST TR98-05
  • 7[7]ISS Corporation. Real Secure.http:∥www.iss.net/prod/rs.php3
  • 8[8]CISCO NetRanger. http:∥www.wheelgroup.com/warp/public/cc/cisco/mkt/security/nranger/inde.html
  • 9[9]D L Tennenhouse,D Wetherall. Towards an Active Network Architecture.In Multimedia Computing and Networking 96, 1996
  • 10[10]Tennenhouse et al.A survey of Active Network Research[J].IEEE Communications, 1997; 1: 80~86

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部