期刊文献+

递进式网络数据包解析与过滤方法研究 被引量:1

Research on progressive parsing and filtering of network packets
下载PDF
导出
摘要 在分析企业对内部网络监控系统需求的基础上,提出了一种适用于内网监控系统的递进式网络数据包解析与过滤的方法。该方法包括网络数据包的截获、解析和过滤3个主要功能,其中主要分析了数据包解析与过滤的实现,采用递进式分级解析数据包的方式和高效的BM模式匹配算法进行规则匹配,提高了数据包解析过滤的效率。实验结果表明,该方法的应用对网络数据传输产生的延时较小,基本不影响内网用户对网络的正常使用。 On the basis of analysis of the demand of the enterprise internal network monitoring system,an approach of progressive network packets parsing and filtering used for internal network monitoring system is proposed,which has three main functions including capturing,parsing and filtering the network packets,and mainly analyzes the implementation of parsing and filtering the packets.Parsing packets progressively and efficient BM algorithm for rule-matching are adopted to improve the efficiency of parsing and filtering the packets.The experimental results show that this method causes little delay to network data transmission,and the internal network users can hardly feel the effect when they are using the network.
作者 陈永府 杨朋
出处 《计算机工程与设计》 CSCD 北大核心 2011年第3期781-783,813,共4页 Computer Engineering and Design
关键词 网络数据包 递进式 解析 规则匹配 过滤 network packets progressive parse rule-matching filter
  • 相关文献

参考文献7

二级参考文献25

共引文献82

同被引文献15

  • 1PENG Yong,JIANG Changqing,XIE Feng.Industrial control system cyber security research[J].Journal Tsinghua University(Science&Technology),2012,52(10):1396-1405.
  • 2LI Hongpei,HU Chaojian,WANG Xiaopeng.The safety research and practice of the 2014industrial control system[J].Computer Security,2014,14(5):36-59.
  • 3Eric K D.Industrial network security securing critical infrastructure networks for smart grid,SCADA,and other industrial control system[M].Syngress,2011.
  • 4Niv Goldenberg,Avishai Wool.Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems[J].International Journal of Critical Infrastructure Protection,2013,6(2):63-75.
  • 5Papa SM.A behavioral intrusion detection system for SCADA systems[D].Southern Methodist University,2013.
  • 6YUAN Ziqiang.The design and implementation of the white list system in the network environment[D].Chengdu:University of Electronic Science and Technology of China,2011.
  • 7Lubna K,Cyiac R.Firewall log analysis and dynamic rule reordering in firewall policy anomaly management framework[C]//International Conference on Green Computing,Communication and Conservation of Energy.IEEE,2013:853-856.
  • 8SONG Xinjing.Research and application of self-learning warning system based on business rules[D].Harbin:Harbin Engineering University,2012.
  • 9YANG Shuqin.Research and implementation of security audit system based on log[D].Beijing:Beijing University of Posts and Telecommunications,2011.
  • 10彭勇,江常青,谢丰,戴忠华,熊琦,高洋.工业控制系统信息安全研究进展[J].清华大学学报(自然科学版),2012,52(10):1396-1408. 被引量:175

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部