期刊文献+

一种分布式防火墙过滤策略的异常检测模型 被引量:3

Model for discovering anomalies of distribute firewall filtering policy
下载PDF
导出
摘要 分布式防火墙的安全性很大程度上取决于过滤策略正确配置。过滤策略的异常可能导致分布式防火墙系统所保护的网络出现严重的访问漏洞。为了能够自动化地检测分布式防火墙过滤策略存在的异常,对分布式防火墙系统中各过滤节点上的过滤规则之间可能出现的异常进行分类,并建立了一个过滤策略异常检测的模型。该模型能够检测出分布式防火墙过滤规则之间的冗余、冲突、不完整等各种异常,从而保证了分布式防火墙过滤策略的完整性和一致性。 The security of the distribute firewall lies deeply on the correct configuration of filtering policy. The anomalies of the filtering policy will result in fateful access vulnerability of the network protected by the distribute firewall system. In order to discovery the anomalies of the distribute firewall filtering policy automatically, the possible anomalies among the rules of all filtering nodes of the distribute firewall system is classified and defined, and a model for discovering anomalies of distribute firewall filtering policy is made. With this model, all kinds of anomalies such as redundancy anomaly, conflict anomaly and incomplete anomaly among the filtering rules of the distribute firewall is discovered to ensure the integrality and consistency of the filtering policy.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第22期4201-4203,4206,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2003AA146010)
关键词 分布式防火墙 过滤策略 异常检测 过滤结点 过滤规则 distribute firewall filtering policy anomaly discovering filtering node filtering rule
  • 相关文献

参考文献14

  • 1Bellovin S M.Distributed firewalls[C].Login:Magazine,Special Issue on Security,1999.37-39.
  • 2Robert Stepanek.Distribute firewall[C].Seminar on Network,Security Telecommunications Software and Multimedia Laboratory,2001.
  • 3Woo T.A modular approach to packet classification:Algorithms and results[C].Proceedings of IEEE INFOCOM'00,2000.
  • 4Cobb S.ICSA firewall policy guide v2.0[M].NCSA Security White Paper Series,1997.
  • 5Hazelhusrt S.Algorithms for analyzing firewall and router access lists[R].South Africa:Technical Report TRWitsCS-1999,Department of Computer Science,University of theWitwatersrand,1999.
  • 6Fu Z,Wu F,Huang H,et al.IPSec/VPN security policy:Correctness,conflict detection and resolution[C].Proceedings of Policy 2001 Workshop,2001.
  • 7Al-Shaer E,Hamed H.Design and implementation of firewall policy advisor tools[R].TechnicalReport CTI-techrep0801,School of Computer Science Telecommunications and Information Systems,DePaul University,2002.
  • 8Al-Shaer E,Hamed H.Firewall policy advisor for anomaly detection and rule editing[C].IEEE/IFIP Integrated Management IM,2003.
  • 9Al-Shaer E,Hamed H.Management and translation of filtering security policies[C].IEEE International Conference on Communications,2003.
  • 10Hari B,Suri S,Parulkar G.Detecting and resolving packet filter conflicts[C].Proceedings of IEEE INFOCOM'00,2000.

同被引文献21

  • 1蒋康丽,熊齐邦.策略网管中规则冲突检测算法的研究[J].计算机工程与设计,2005,26(1):79-81. 被引量:4
  • 2A1-Shaer E, E1-Atawy A, Samak T. Automated pseudo-live testing of firewall configuration enforcement [J]. Network In- frastructureConfiguration, 2009, 27 (3):302-314.
  • 3Senn D, Basin D, Caronni G. Firewall conformance testing [C]. TestCom, 2005: 226-241.
  • 4Kiesel S, Scharf M. Modeling and performance evaluation of transport protocols for firewall control [J]. Computer Net- work, 2007, 51 (11): 3232-3251.
  • 5Brucker A D, Brtigger L, Kearney P, et al. Verified firewall policy transformations for test case generation [C]. Third In- ternational Conference on Software Testing, Verification and Validation, 2010: 345-354.
  • 6Tuglular T, Kaya O, Muftuoglu A, et al. Directed acyclic graph modeling of security policies for firewall testing [C]. Proceedings of SSIRI, 2009: 393-398.
  • 7Alex X L. Firewall policy verification and trouble shooting [J]. Computer Networks, 2009, 53 (16): 2800-2809.
  • 8Winding R, Wright T, Chapple M. System anomaly detec- tion., mining firewall logs[C]. Proceedings of the Securecomm and Workshops. IEEE Computer Society, 2006 : 1-5.
  • 9Stanford P J, Parish D J, Stanford J M. Detecting security threats in the network core using data mining techniques [C]. Network Operations and Management Symposium, 2006: 1-4.
  • 10Golnabi K, Min R K, Khan L, et al. Analysis of firewall policy rules using data mining techniques [C]. Proceedings of the 10th IEEE/IFIP Symposium on Network Operation and Management, 2006: 305-315.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部