期刊文献+

一种针对网络信息安全系统的测试方法 被引量:1

Performance Evaluation for Network Information Security System
下载PDF
导出
摘要 随着网络的高速发展,网络信息安全产品日益成熟,但是针对这类产品的测试方法的研究却仍不完善。文章基于ServerScope测试仪的软硬件结构,提出了一种新的测试网络信息安全产品的方法。该方法继承了ServerScope软件结构上面向用户的特点,同时利用ServerScope硬件刀片服务器的特点,在系统中同时模拟客户端和服务端,易生成网络信息安全系统所特有的交互式负载。该方法弥补了传统回放方法负载单一的不足,并且简化了复杂的测试环境,使得测试更加易行、有效。 With the fast development of network, network information security systems (NISS) make a long progress. But performance evaluation for NISS is found to be challenging. The paper illustrates a new method based on the architecture of ServerScope to test NISS. To generate the interactive network traffic especially needed by NISS, some blades can play the role of the servers and some do the clients. This method makes up the disadvantage of replaying the same traffic and simplifies the testing environment so that it ensures that the implementation of test is easy and efficient.
作者 刘莹 田野
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第20期140-142,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2002AA104410) 中科院计算所创新课题资助项目(20026030)
关键词 网络信息安全系统 SERVERSCOPE 交互式负载 性能评测 Network information security system ServerScope Interactive workload Performance evaluation
  • 相关文献

参考文献7

  • 1焦丽梅,孙凝晖,褚兴军.ServerScope:一种新的性能评测系统的提出[J].计算机工程与应用,2003,39(13):55-57. 被引量:6
  • 2Hall M,Wiley K.Capacity Verification for High Speed Network Intrusion Detection Systems[C].Proceedings of the Recent Advances in Intrusion Detection,2002.
  • 3Antonatos S,Anagnostakis K G,Markatos E P.Generating Realistic Workloads for Network Intrusion Detection Systems[C].Proc.of ACM WOSP' 04,2004.
  • 4Antonatos S,Anagnostakis K G,Polychronakis M,et al.Performance Analysis of Content Matching Intrusion Detection Systems[C].Proceedings of the 4th IEEE/IPSJ Symposium on Applications and the Internet,2004.
  • 5刘莹,焦丽梅,孙凝晖.基于ServerScope的TCP/IP负载发生器的研究[J].小型微型计算机系统,2005,26(5):850-854. 被引量:2
  • 6Hubona G S,Burton-Jones.Modeling the User Acceptance of E-Mail[C].IEEE Proceedings of the 36th Hawaii International Conference on System Sciences,2003.
  • 7Undercoffer,Pinkston J.Modeling Computer Attacks:A Target-centric Ontology for Intrusion Detection[C].proc.of RAID'03,2003.

二级参考文献5

  • 1谷长勇.事务处理服务器的性能评价研究 博士学位论文[D].北京:中科院计算技术研究所,2001—12.
  • 2孙定.刀片服务器的妙与糙[Nl[J].计算机世界,(06):9-9.
  • 3Ma Qing-ming, Peter Steenkiste. Performance of circuit switched LAN sunder different traffic conditions[C]. Proceedings 19th Conference on Local Computer Networks, Minneapolis, Minnesota, USA, October 2-5, 1994. IEEE Computer Society, 1994, ISBN 0-8186-6680-3.
  • 4Purushotham Kamath, Kun-chan Lan, John Heidemann et al.Generation of high bandwidth network traffic traces[C]. 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems (MASCOTS'02) October 11 - 16, 2002,Fort Worth, Texas.
  • 5焦丽梅,孙凝晖,褚兴军.ServerScope:一种新的性能评测系统的提出[J].计算机工程与应用,2003,39(13):55-57. 被引量:6

共引文献6

同被引文献13

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部