期刊文献+

嵌入式防火墙规则冲突检测算法的实现 被引量:1

Implementation of Rules Collision Detection Algorithm for Embedded Firewall
下载PDF
导出
摘要 在嵌入式状态检测防火墙应用中,规则冲突检测是影响系统安全及服务质量的关键。由于嵌入式系统受系统资源制约,基于文本的防火墙规则检测较基于数据库完整性检查的规则冲突检测更灵活、实用。文章首先对iptables防火墙管理程序及其脚本的语法规则进行介绍;然后完成基于文本的防火墙规则检测算法的实现,最后对算法性能进行了分析。 Firewall rules collision detection is important in the application of the embedded status filtering firewalL It can affect the security and the QoS of the system. In some embedded systems, the storage of which is small scale, the text-based firewaLl rules collision detection mechanism is more flexible and practical than the database-based one because of the limit of the resource of the systems. In this paper, we firstly introduce the iptables firowaLl management program and its script grammar.. Then we implement the textbased firewall rides coLlision detection in an embedded system. FinaLly, we analyze the performance of the coLlision detection algorithm.
出处 《实验科学与技术》 2009年第6期153-156,共4页 Experiment Science and Technology
基金 西南交通大学大学生科研训练计划项目(SRTP)
关键词 IPTABLES防火墙 嵌入式系统 规则冲突检测 iptables firewall embedded system rules collision detection
  • 相关文献

参考文献3

二级参考文献17

  • 1[1]Olaf Kirch Terry Dawson 著,唐钧,张淘译.Linux网络管理员指南[M].北京:中国电力出版社,2001.05
  • 2[3]Michael Jang 著,毛选,韩滨译.Enterprise Linux3从入门到精通[M].北京:电子工业出版社,2005.03
  • 3[4]Steve Suehring.Linux Firewalls,Third Edition[M].Sams Publishing,2005
  • 4Eppstein D,Muthukrishnan S.Intemet packet filter management and rectangle geometry[C]//Proceedings of 12th Annual ACM-SIAM Symposium on Discrete Algorithms(SODA).Washington D C:ACM Press,2001:827-835.
  • 5Hari B,Suri S,Parulkar G.Detecting and resolving packet filter conflicts[C]//Proceedings of IEEE INFOCOM'00.Tel Aviv,Israel:IEEE Press,2000:1203-1212.
  • 6Lupu E,Sloman M.Conflict analysis for management policies[C]//Stadler R,Lazar A,Saraco R.Proceedings of IFIP/IEEE International Symposium on Integrated Network Management (IM'97).San-Diego:IEEE Press,1997:430-443.
  • 7Fu Z,Wu F,Huang H,et al.IPSec/VPN security policy:correctness,conflict detection and resolution[C]//Proceedings of Policy'2001 Workshop,2001:39-56.
  • 8Eronen P,Zitting J.An expert system for analyzing firewall rules[C]//Proceedings of 6th Nordic Workshop on Secure IT-Systems(NordSec 2001),Copenhagen,Denmark:Technical University of Denmark,2001:100-107.
  • 9Chapman D,Zwicky E.Building Internet firewalls[M].2nd.[S.l.]:Orielly & Associates Inc,2000.
  • 10Cheswick W,Belovin S.Firewalls and Internet security[M].[S.l.]:Addison Wesley,1995.

共引文献12

同被引文献13

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部