期刊文献+

基于网络处理器的UTM系统研究与实现 被引量:2

Research and implementation of UTM system based on network processor
下载PDF
导出
摘要 随着互联网的发展,隐藏的安全问题也越来越复杂和严重,然而传统网络安全设备无法抵御现在错综复杂的网络威胁,在实际网络应用方面迫切需求将多种安全功能集中在1台设备中,即研究的核心内容———统一威胁管理平台(UTM)。针对目前UTM产品的不足,通过研究网络处理器技术、模式匹配技术和深度检测技术,提出实现UTM的新方法。基于网络处理器和Linux操作系统,借助功能强大的硬件引擎———模式匹配,完成了UTM系统的设计方案,并阐述了该方法的具体实现步骤,并在SmartBits 6000C平台测试环境和真实网络环境中对UTM进行了测试,测试分析表明本系统具备对多种威胁的识别能力。 With the development of Internet,hidden security issues become increasingly complex and serious.However,the traditional network security devices could not resist the intricate threats on Internet.In practical operation,a variety of security features are demanded to be integrated into a single device,which is the core of this paper-Unified Threat Management(UTM).In terms of the weakness of current UTM,the author studies on NP,Pattern Matching and DPI technologies to achieve the new methods of implementation of UTM.Based on NP,Linux operating systems and one powerful hardware engine,i.e.,IPME,the paper completes the UTM system design and describes the specific steps of implementation.Then,a test is carried out in both SmartBits 6000C platform test environment and real-network test environment,and the results shows that the UTM system embodies a fine performance on the ability to identify a variety of threats.
作者 傅振
出处 《电子测量技术》 2011年第5期98-102,共5页 Electronic Measurement Technology
基金 上海市科委开放型项目资助(09511501300) 上海市重点学科建设基金资助项目(S30108)
关键词 统一威胁管理 深度包检测 模式匹配 网络处理器 unified threat management deep packet inspection pattern matching network processor
  • 相关文献

参考文献9

二级参考文献53

共引文献57

同被引文献18

  • 1FLETCHER S. Electric power interruptions curtail califor- nia oil and gas production[ J ]. Oil Gas J. ,2001,99 (7) : 10-12.
  • 2CONNOLE P. California power crisis may become national mess[ N]. Reuters,2001-02-15.
  • 3U. S. Canada power system outage task force [ R ]. Final Report on the August 14,2003.Blackout in the United States and Canada: Causes and Recommendations,2004.
  • 4CONRAD S H, LECLAIRE R J, O' REILLY G P, et al. Critical national infrastructure reliability modeling and analysis [J]. Bell Labs Technical Journal, 2006, 11(3) :57-71.
  • 5GARG M, SMTFH J C. Models and algorithms for the de- sign of survivable muhi-commodity flow networks with general failure scenarios [ J ]. International Journal of Management Science ,2008,36 ( 6 ) : 1057-1071.
  • 6NOZICK L K,TURNQUIST M A, JONES D A, et al. As- sessing the performance of interdependent infrastructures and optimising investments [ J ]. International Journal of Critical Infrastructure ,2005,1 ( 2 ) : 144-154.
  • 7HAIMES Y Y, HOROWITZ B R, LAMBERT J H, et al. Inoperability input-output model (IIM) for interdepend- ent infrastructure sectors. I : Theory and methodology [ J ]. Journal of Infrastructure System ,2005,11 (2) :67-79.
  • 8HAIMES Y Y, HOROWITZ B R, LAMBERT J H, et al. lnoperability input-output model (IIM) for interdepend- ent infrastructure sectors. II : Case study [ J ]. Journal of In- frastructure System ,2005,11 (2) :80-92.
  • 9毛子骏,费奇,欧阳敏,洪流.关联基础设施网络模型研究综述[J].计算机科学,2009,36(3):5-8. 被引量:10
  • 10石云平.数据挖掘与统计学的关系研究[J].国外电子测量技术,2009,28(6):21-23. 被引量:2

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部