期刊文献+

网络集成防护系统的分层事件驱动风格

A Layered Event-driven Architecture Style of Network Integrated Protection System
下载PDF
导出
摘要 网路集成防护系统是有效防御网络攻击的一种手段,其面临的最大问题之一是如何有效集成响应和处理系统,并在可扩展性和快速响应之间取得折衷。本文吸收了分层框架和消息驱动框架的优点,提出并实现了一种分层事件驱动框架风格,它在提供了较高的灵活性的同时也强调了足够的系统响应速度。该框架风格的优势在我们实现的集成防护系统中得到了验证。 Network Integrated Protection System is an efficient security facility. It is confronted with a greatest problem which is how to integrate response and handling systems, while balancing the extensibility and speed of response. This paper combines the advantages of both layered architecture and message-driven architecture to present a new architecture style, Layered Event-driven Architecture. It gets a tradeoff between the flexibility and response speed. It is implemented in our network integrated protection system.
出处 《计算机科学》 CSCD 北大核心 2006年第1期75-77,共3页 Computer Science
基金 本文受信息产业部生产发展基金项目网络安全集成防护系统支持 项目代号信部运[2002]546。
关键词 框架风格 分层事件驱动风格 基于消息的驱动 分层构架 防护系统 网络集成 事件驱动 风格 快速响应 网络攻击 Architecture style, Layered message-driven architecture style, Message-driven, Layered architecture
  • 相关文献

参考文献9

  • 1Shaw M, Garlan D. Software architecture perspectives on emerging discipline. Prentice Hall, 1996.
  • 2韩宏,卢显良,任立勇.插件式网络安全集成防护框架[J].计算机科学,2005,32(4):149-150. 被引量:1
  • 3Gamma E, Helm R. Design Patterns Elements of Reusable Object-Oriented Software. Addison Wesley Longman, 1995.
  • 4Krasner G E, Pope S T. A cookbook for using the Model-View-Controller user interface paradigm in smalltalk-80. Journal of Object-Oriented Programming, SIGS Publications, New York, NY,USA, 1988.
  • 5Coutaz J. PAC, an Object Oriented Model for Dialog Design,Human-Computer Interaction. In: INTERACT'87 proceedings,1987.
  • 6Kruchten P B. The 4 + 1 View Model of Architecture. IEEE Software, Nov. ]995.
  • 7Fowler A. A Swing Architecture Overview: The Inside Story on JFC Component Design. http://java. sun. com/products/jfc/tsc/articles/architecture/.
  • 8Buschmann F, Meunier R. Pattern-Oriented Software Architecture Voluml: A System of Patterns. John Wiley & Sons, Inc.1996.
  • 9Reiss S P. Connecting tools using message passing in the Field Environment. IEEE Software, July 1990.

二级参考文献8

  • 1Reilly M, Stillman M. Open infrastructure for scalable intrusion detection. In: Proc. of Information Technology Corf. IEEE, Sep.1998
  • 2Bellovin S M. Distributed Firewalls. login: magazine, special issue on security, Nov. 1999
  • 3Stout B. Pirewall Farms Whitepaper. www. geocities. com/ResearchTriangle/3372/firewall farms. html
  • 4Simth R N. Firewall Implement In A Large Network Toplogy. In:Proc. IEEE Future Trends of Distributed Computing Systems,Oct. 1997
  • 5Snort2. 0 Detection Revisited. http://www. sourcefire. com/technology/whitepapers/sf_snort20 detection_rvstd. pdf
  • 6Prevelakis V. Designing an Embedded Firewall/VPN Gateway.http://www. prevelakis. net/Papers/vpn8. pdf
  • 7System Design Document: Next-Generation Intrusion Detection Expert System: [Report]. March 1993
  • 8Balasubramaniyan J S, Garcia-Fernandez J O. An Architecture for Intrusion Detection using Autonomous Agents: [COAST Technical Report]. June 1998

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部