期刊文献+

可扩展的网络安全设备内策略冲突检测算法 被引量:5

Extendible intra network security device policy conflict detection algorithm
下载PDF
导出
摘要 从研究网络安全设备内策略冲突检测方法入手,针对当前设备内策略冲突检测算法不具有扩展性的缺点,采用规范化和离散化技术,将策略域的属性数据统一映射到实数区间;通过定义实数区间的关系运算判断策略域之间的关系;在此基础上设计了一种可扩展的网络安全设备内冲突检测算法;该算法通过规则过滤处理,提高了安全策略冲突检测算法的执行效率。实验验证表明该算法正确高效,具有实用价值。 This paper researched the intra network security device policy conflict detection method firstly.To aim at the lack of extendibility of most intra network security device policy conflict detection algorithms,used the standardization and discretization technologies,which mapped the attribute data of policy fields to the real number interval.Through defining the relation operation in real number interval,determined the relation between policy fields.Based on it,designed an extensible intra network security device policy conflict detection algorithm.Applying the rule filtering,improved the execute efficiency of the algorithm.The experimentation results show that the algorithm is correct,efficient and have practical value.
出处 《计算机应用研究》 CSCD 北大核心 2010年第4期1484-1488,共5页 Application Research of Computers
基金 国家"863"计划资助项目(2006AA701416 2006AA01Z457)
关键词 网络安全设备策略 设备内冲突检测 可扩展 规范化 离散化 规则过滤 network security device policy intra device conflict detection extendible standardization discretization rule filtering
  • 相关文献

参考文献14

  • 1AL-SHAER E,HAMED H.Taxonomy of conflicts in network security policies[J].IEEE Communications Magazine,2006,44(3):134-141.
  • 2EPPSTEIN D,MUTHUKRISHNAN S.Internet packet filter management and rectangle geometry[C]//Proc of the 12th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA).[S.l.]:ACM Computing Research Repository,2001:827-835.
  • 3HARI A,SURI S,PARULKAR G.Detecting and resolution packet filter conflicts[C]//Proc of the 19th Annual Joint Conference of the IEEE Computer and Communications Society.Tel Aviv,Israel:IEEE,2000:1203-1212.
  • 4ALFARO J G,CUPPENS F,BOULAHIA C N.Towards filtering and alerting rule rewriting on single-component policies[C]//Proc of Conference on Computer Safety,Reliability,and Security.Berlin:Springer,2006:182-194.
  • 5王卫平,陈文惠.防火墙规则配置错误分析及其检测算法[J].计算机应用,2005,25(10):2269-2271. 被引量:3
  • 6MAYER A,WOOL A,ZISKIND E.Fang:a firewall analysis engine[C]//Proc of IEEE Symposium on Security and Privacy.Berkeley,CA:IEEE,2000:177-187.
  • 7WOOL A.Architecting the lumeta firewall analyzer[C]//Proc of the 10th USENIX Security Symposium.Berkeley,CA:USENIX Association,2001:7.
  • 8ERONEN P,ZITTING J.An expert system for analyzing firewall rules,IMM-TR-2001-14[R].[S.l.]:University of Denmark,2001:100-107.
  • 9GAO Zhuo-min.Conflict handling in policy-based security management[D].Florida:The University of Florida,2002.
  • 10AL-SHAER E S,HAMED H H.Discovery of policy anomalies in distributed firewalls[C]//Proc of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies.[S.l.]:IEEE,2004:2605-2616.

二级参考文献9

  • 1GOUDA M, LIU X. Firewall Design: Consistency, Completeness,and Compactness[ A]. Proceedings of the 24th IEEE International Conference on Distributed Computing Systems (ICDCS'04)[ C],March 2004.
  • 2Al-SHAER E, HAMED H. Management and translation of filtering security policies[ A]. IEEE International Conference on Communications[C], May 2003.
  • 3Al-SHAER E, HAMED H. Firewall policy advisor for anomaly detection and rule editing[ A]. IEEE/IFIP Integrated Management IM'2003[ C], March 2003.
  • 4Al-SHAER E, HAMED H. Design and Implementation of Firewall Policy Advisor Tools [ R]. Technical Report CTI-techrep0801,School of Computer Science Telecommunications and Information Systems, DePaul University, August 2002.
  • 5HARI B, SURI S, PARULKAR G. Detecting and Resolving Packet Filter Conflicts[A]. Proceedings of IEEE INFOCOM'2000[ C],March 2000.
  • 6BABOESCU F, VARGHESE G. Fast and scalable conflict detection for packet classifiers[ A]. Proceedings of the 10th IEEE International Conference on Network Protocols[C], 2002.
  • 7WANG D, HAO RB, LEE D. Fault Detection in Rule-Based Software Systems[ J]. Concordia Prestigious Workshop on Communication Software Engineering, Montréal, Canada, Sept. 2001. Extended version to appear in the International Journal of Information and Software Technology, Elsevier, 2003, (45): 865 -871.
  • 8WOOL A. A quantitative study of firewall configuration errors[ J].IEEE Computer Society, June 2004:62 -67.
  • 9HAN J, KAMBER M. Data Mining: Concepts and Techniques[ M].Morgan Kaufmann, 2000.

共引文献2

同被引文献17

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部