期刊文献+

一种基于NDIS的Web安全防护技术与性能研究 被引量:1

A technology of Web security protection and performance research based on NDIS
原文传递
导出
摘要 针对目前Web存在的安全问题,结合Windows平台的网络驱动模型,提出了采用Windows内核下NDIS中间层的数据包过滤检测方法,对Http的请求和响应进行有效的监控和检测,从而达到Web的安全防护,最后从排队论的角度分析了系统的抗过载性能,测试表明系统可以有效的防护Web的安全. For the current problems of web security, and combined with network driver model on Windows OS platform, this paper puts the method of using the data packet filtering of Windows kernel NDIS intermediate layer to monitor and test the requests and responses of Http forward, so as to achieve the purpose of Web se- curity protection. And finally, from the point of the Queuing Theory, this paper will analyze the performance of the Anti-overload system to show that this system can protect Web effectively.
出处 《四川大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第6期1400-1404,共5页 Journal of Sichuan University(Natural Science Edition)
关键词 N-DIS HTTP 监控 排队 ndis, http, monitor, queuing
  • 相关文献

参考文献6

  • 1喻莉,石冰心.基于HTTP的网络服务性能建模与分析[J].电子与信息学报,2001,23(1):53-59. 被引量:4
  • 2Russinovich M E, Sol.non D A. Microsoft Windows Internals Microsoft Windows Server^TM[ M]. 4th ed. Beijing: Microsoft Press Publisher, 2004.
  • 3He C K. Design and implementation of a personal firewall based on NDIS intermediate drivers [J]. Eighth ACIS International Conference on Software Engineering, 2007, 233: 10.
  • 4Lam S, Kleinrock L. Packet switching in a multi access broadcast channel: dynamic control procedures [J]. IEEE Trans on Commun, 1975, 23: 9.
  • 5姚念民,鞠九滨.过载服务器的性能研究[J].软件学报,2003,14(10):1781-1786. 被引量:12
  • 6Chris R. Defeating windows personal firewalls: filtering methodologies, attacks, and defenses [J]. Vigilant- Minds Inc, 2005.

二级参考文献15

  • 1喻莉.现代通信网络性能分析建模与仿真研究,博士论文[M].武汉:华中理工大学,1999..
  • 2Stevens W. TCP/IP Illustrated Volume 1. Addison Wesley. 1993.
  • 3Trent G, Sake M. WebStone: The first generation in HTTP server benchmarking. 1995. http://www.mindcrafl.com/webstone/paper.html.
  • 4Banga G, Druschel P. Measuring the capacity of a web server. In: Proceedings of the USENIX Symposium on Internet Technologies and Systems. Monterey, 1997. 61-67.
  • 5Druschel P, Banga G. Lazy receiver processing (LRP): A network subsystem architecture for server systems. In: Proceedings of the 2nd Symposium on Operating Systems Design and Implementation (OSDI'96). 1996. 261-275.
  • 6Banga G, Druschel P, Mogul ]C. Resource con-ers: A ne0: facility for resource management in server systems. In: Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation. New Orleans, 1999. 45-58.
  • 7Cherkasova L, Phsal P. Session based admission control: A mechanism for improving tle performance of an overloaded Web server. Technical Report, HPL-98-June, 1998.
  • 8Carter R, Cherkasova L. Detecting timed-out client requests for avoiding livelock and improving Web server performance. In:Proceedings of the IEEE Symposium on Computers and Communications. Antibes, IEEE, 2000.
  • 9Mogul JC, Ramakrishnan KK. Eliminating receive livelock in an interruptdriven kernel. ACM Transactions on Computer System,1997,15(3 ):217-252.
  • 10Voigt T, Tewari R, Freimuth D, Mehra A. Kernel mechanisms for service diffeentiation in overloaded Web servers. In:Proceedings of the 2001 USENIX Annual Technical Conference.Boston: USENIX Association, 2001.

共引文献14

同被引文献9

  • 1EMC corporation.EMC time finder[EB/OL].(2000-06-28).[2009-4-10].http:∥www.emc.com/products/product_pdfs/ds/timefinder_1 700-4.pdf.
  • 2Veritas.VERITAS FlashSnap[EB/OL].(2002-03-12).[2009-4-10].http:∥eval.veritas.com/downloads/pro/fsnap_guide_wp.pdf.
  • 3Shah B.Disk performance of Copy-On-Write snapshot logical volumes[D].Vancouver:The University of British Columbia,2006.
  • 4Red Hat Inc.LVM HOWTO[EB/OL].(2003-05-08).[2009-4-10].http:∥www.ibiblio.org/pub/Linux/docs/HOWTO/other-formats/pdf/LVM-HOWTO.pdf.
  • 5Naik D.Inside windows storage[M].New Jersey:Addison Wesley,2003.
  • 6Oney W.Programming the microsoft windows driver model[M].2nd ed.Redmond:Microsoft Press,2003.
  • 7Xie G J,Fu G X,Li Y S,et al.ESnap-A cached dependent snapshot system[C]∥Proceedings of the 2007 IEEE International Conference on Integration Technology.Shenzhen:[s.n.],2007.
  • 8Xie G J,Wang F,Wang G,et al.ESnapII-A writable dependent snapshot system with shared cache[C]∥ Ninth ACIS International Conference on Software Engineering,Artificial Intelligence,Networking,and Parallel/Distributed Computing.Phuket Thailand:Springer,2008.
  • 9Veritas软件公司.企业重生-信息系统的灾难恢复[M].北京:机械工业出版社,2004.

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部