期刊文献+

基于多核的安全网关设计与实现 被引量:3

Design and Implementation of Multicore-based Security Gateway
原文传递
导出
摘要 传统的安全网关大多基于单核系统开发,受限于硬件发展的瓶颈,单核难以满足日益增长的网络性能要求。该文提出了一种基于多核的安全网关的设计模型,并根据此模型实现了一款安全网关,经过测试表明,此款安全网关的实现与通用安全网关相比性能优异,满足高性能网络安全的需要。 Most traditional security gateways are development are developed on the basis of monocore system, thus restricted by the battlement of hardware development. The moncore system is hard to satisfy the ever-spiralling network performance requriment. This paper proposes a parallel processing model for multicore-based security gateway, and on this basis a security gateway is implemented. Performance test indicates that this security gateway is exceedingly functional competent as compared with the traditional security gateway, and thus could satisfy the security requirement of high-performance network.
出处 《信息安全与通信保密》 2009年第6期101-104,共4页 Information Security and Communications Privacy
基金 2007年度北京市高成长企业自主创新科技专项
关键词 安全网关 多核 并行处理 架构 security gateway multi-core parallel processing architecture
  • 相关文献

参考文献3

  • 1Paxson V,Sommer R,Weaver N.An Architecture for Exploiting Multi-core Processors to Parallelize Network Intrusion Prevention[C]./Proceedings of the IEEE Sarnoff Symposium.[S.1.] IEEE Press,2007.
  • 2熊庆国,王鑫,文昕,王恒心.多核技术在嵌入式领域的新发展[J].仪器仪表学报,2006,27(z3):2601-2602. 被引量:9
  • 3XLRTM Processor Family Data Sheet.RMI Corporation[R].

二级参考文献4

  • 1[1]Dominic Herity,Applying distributed system concepts to embedded multiprocessor designs,Jan,2006.
  • 2[2]Charles J.Murray-Design News,June 2005.
  • 3[3]ARM Inc http://www.arm.com.
  • 4翁寿松.摩尔定律与半导体设备[J].电子工业专用设备,2002,31(4):196-199. 被引量:14

共引文献8

同被引文献25

  • 1李俊婷,王文松,袁维义.计算机网络信息安全及其防护措施[J].计算机与网络,2007,33(15):45-46. 被引量:20
  • 2DEY T K, SUN J. Defining and Computing Curve Skeletons with Medial Geodesic Function[C]// Proc of the 4th Eurographics Symp on Geometry Processing New York; ACM, 2006: 143-152.
  • 3AU 0 K C, TAI C L, C[tU H K, et al. Skeleton Extraction by Mesh Contraction[J]. ACM Trans on Graphics: Proc of SIGGRAPH 2008, 2008, 27(03) : 1-10.
  • 4TUNG T, SCHMITT F. Augmented Reeb Graphs for Content-based Retrieval of 3D Mesh Models[C]// Proceedings of the Shape Modeling International. Genova: IEEE, 2004: 157-166.
  • 5BIASOTTI S, GIORGI D, SPAGNUOLO M, et al. Reeb Graphs for Shape Analysis and Applications[J]. Theoretical Computer Science, 2008, 392(1-3):5-22.
  • 6SHINAGAWA Y, KUNII r. Constructing a Reeb Graph Automatically from Cross Sections[J]. IEEE Computer Graphics and Applications, 1991, ii(06): 44 -51.
  • 7COLE-MCLAUGHLIN K, EDELSBRUNNER H, HARER J, et al. Loops in Reeb Graphs of 2-manifolds [C]// Proceedings of the 19th Annual Symposium on Computational Geometry. New York;ACM, 2003:344-350.
  • 8GONZALEZ J J, MOORE A P. System dynamics modeling for information security [EB/OL]. [2004-09-10]. http://www.cert.org/ research/sdmis/inside-threat-desc.
  • 9胡征畴.蜜罐技术在入侵检测系统中的应用[D].武汉:武汉理工大学,2007.
  • 10Tenable Network Security. Features [EB/OL]. [2009-02-03]. http ://www.nessus.org/nessus/features/.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部