期刊文献+

支持联动的局域网主机隔离系统的设计和实现 被引量:1

Design and implementation of hosts quarantine system with cooperation support in LAN
下载PDF
导出
摘要 面对越来越严重的网络安全问题,以隔断恶意主机的危害为目的,分析了目前恶意主机隔离方法的不足,提出并实现了一种支持联动的局域网主机隔离系统。该隔离系统通过与管理端和已授权的检测设备联动,得到要隔离的恶意主机IP,采用ARP伪装技术,阻断恶意主机与网关的通信,阻止危害向外扩散,从而达到隔离恶意主机的目的。实验结果表明,该系统隔离效果好,对局域网影响小。 Faced with increasingly serious issue of network security, focus on cutting offthe malicious host' s harm, to overcome the shortcomings of malicious host isolation technologies, a hosts quarantine system with cooperation support in LAN is proposed and implemented to quarantine local malicious hosts. The quarantine system can cooperate with the manager and the detection devices who is authorized. When obtaining the malicious host' s IPs, the quarantine system will immediately break up the communication between malicious hosts and the gateway using ARP masquerade technology. Thus the spreading of harm from the LAN to the outside network will be prevented. The results show that the quarantine effect is obvious and the quarantine system makes a minor impact on the LAN.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第18期4163-4166,4171,共5页 Computer Engineering and Design
基金 湖北省自然科学基金项目(2006ABA039) 湖北省教育厅科学研究计划基金项目(D200623002)
关键词 恶意主机 联动 ARP伪装 主机隔离 检测设备 malicious host cooperation ARP masquerade hosts quarantine detection devices
  • 相关文献

参考文献13

二级参考文献24

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2Anonymous.网络安全技术内幕[M].北京:机械工业出版社,2000-03..
  • 3StevensWR.TCP/IP详解(卷1):协议[M].北京:机械工业出版社,2001.08.
  • 4AtkinsD.Internet网络安全专业参考手册[M].北京:机械工业出版社,1998.08.
  • 5国家保密局.计算机信息系统国际联网保密管理规定[EB/OL].http://www.cnnic.net.cn/html/Dir/2003/11/27/1482.htm,2000-01.
  • 6Net Gap WebSite.Products Security Platform[EB/OL].http://www.spearheadsecurity.com/site/products/netgap_201.html,2003.
  • 7E-Gap WebSite.Products and Technology: e-Gap Application Firewall[EB/OL].http://www.whalecommunications.com,2003.
  • 8Cheung S, Hoagland J, Levitt K, et al. The design of GRIDS: a graph-based intrusion detection system [ EB/OL]. Davis: U.C. Davis Computer Science Department,1999. http: // eiteseer, nj. nec. com/cheung99design.html.
  • 9Moore D, Paxson V, Savage S, et al. Inside the slammer worm[J]. IEEE Magazine of Security and Privacy,2003, 1(4): 33-39.
  • 10Zou Cliff Changchun, Gong Weibo, Towsley Don, et al.The monitoring and early detection of Internet worms[J ]. IEEE/ACM Transactions on Networking, 2005,13: 961-974.

共引文献142

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部