期刊文献+

面向三网融合的统一安全管控技术 被引量:3

Common Security and Control Framework in Tri-Network Convergence
下载PDF
导出
摘要 基于三网融合面临的业务安全、网络安全、内容安全和行为安全等挑战,文章提出了一种架构独立、运行透明、全程全网的统一安全管控网络。该网络以网络链路为对象,基于分布式安全管控平台,融合了链路流量识别、分析、检查、控制等功能,可实现"一点发现、全网联动"安全控制,并且具有良好的扩展性和适用性。以安全事件的事前防范、事中阻断、事后追溯的技术保障体系为目标,文章分析了统一安全管控网络的支撑技术并给出了其未来发展方向。 This paper proposes a Common Security and Control Framework(CSCF) for application security,network security,information security,and behavioral security in tri-network convergence.CSCF has an independent architecture and can be operated transparently across the whole network.It treats the network link as the control object and can perform functions such as link traffic identification and link traffic analysis.It can also check and control a security problem at one point and initiate a whole-system response.CSCF is based on a distributed security and control platform with high scalability.This paper discusses the development of techniques used to establish a security system that proactively defends against threats,flexibly reacts to and blocks threats as they occur,and traces threats.
出处 《中兴通讯技术》 2011年第4期23-28,共6页 ZTE Technology Journal
基金 国家高技术研究发展("863")计划(2009AA01A346)
关键词 统一安全管控网络 管控中心 管控平台 common security and control framework control center control platform
  • 相关文献

参考文献13

  • 1续俊旗,毛飞琴.改革管理体制 完善法律法规——国外三网融合经验可资借鉴[J].世界电信,2007,20(12):15-18. 被引量:7
  • 2WON Y J, PARK B C, JU H T, et al. A hybrid approach for accurate application traffic identificatJon [C]//Proceedings of the 4th IEEE/ IFIP Workshop on End-to-End Monitoring Techniques and Services(E2EMON'06), Apr 03,2006,Vancouver, Canada. Piscataway, N J, USA: IEEE, 2006:8p.
  • 3KARAGIANNIS T, PAPAGIANNAKI K, FALOUTSOS M. BLINC: Mutilevel traffic classfication in the dark [J}. ACM SIGCOMM Computer Communication Review, 2005, 35 (4):229-240.
  • 4ALSHAMMARI R, ZINCIR-HEYVVOOD A N. Machine learning based encrypted traffic classification: Identifying SSH and skype [C]// Proceedings of the 2nd IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA'09), Jul 8-10. 2009, Ottawa, Canada. Piscataway, NJ,USA: IEEE. 2009: 289-296.
  • 5AHO A V, CORASICK M J. Efficient string matching: an aid to bibliographic search [J]. Communications of the ACM,1975,18(6): 330-340.
  • 6KUMAR S, TURNER J, WILLIAMS J. Advanced algorithms for fast and scalable deep packet inspection [C]ffProceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems(ANCS' 06), Dec 3-5,2006,San Jose, CA, USA. New York, NY USA:ACM. 2006:81-92.
  • 7NAGHMOUCHI J, SCARPAZZA D P, BEREKOVIC M. Small-ruleset regular expression matching on GPGPUs: Quantitative performance analysis and optimization [C]//Proceedings of the 24th ACM International Conference on Supercomputing(ICS' 10), Jun 2-4,2010, Tsukuba, Ibaraki, Japan. New York, NY, USA: ACM. 2010: 337-348.
  • 8LIN Y R, HUANG H Y, HSU W H. An embedded watermark technique in video for copyright protection [C]//Proceedings of theIEEE 18th International Conference on Pattern Recognition (ICPR '06): Vol 4, Aug 20-24, 2006, Hong Kong, China. Piscataway, NJ,USA: IEEE, 2006:795-798.
  • 9SUN Q, HE D, TIAN Q. A secure and robust authentication scheme for video transcoding [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006,16(10): 1232-1244.
  • 10WANG W H, FAFID H. Exposing digital forgeries in video by detecting double MPEG compression IC]//Proceedings of the ACM Muhimedia and Security Workshop(MM&Sec'06), Sep 26-27,2006, Geneva, Switzerland. New York, NY,USA: ACM. 2006:37-47.

共引文献6

同被引文献18

  • 1Cache logic[EB/OLl, http://www.cachelogic.com, 2008.
  • 2A new generation of high trusted network[EB/OL], http://www.863. gov.cn/news/0907/05/0907053613.htm, 2009.
  • 3YD/T,深度分组检测设备技术要求[s].2009.
  • 4DPI深度分组检测技术及其作用[EB/OL]http:l/www.huawei.corn/cn/products/datacomm/catalogdo?id=2146,2007.
  • 5QI Y, FONG J, JIANG W, et al. Multi-dimensional packet calssifica- tion on FPGA: 100Gbps and beyond[A]. Proceedings of Internation Conference on Field-Programmable Technology[C]. Beijing, China, 2010. 241-248.
  • 6SUNG J S, KANG S M, LEE Y, et al. A multi-gigabit rate deep packet inspection algorithm using TCAM[A]. Globecom 2005-1EEE Global Telecommunications Conference[C]. St Louis, Missouri, USA, 2005. 453-457.
  • 7GAO M, ZHANG K N, LU J H. Efficient packet matching for gigabit network intrusion detection using TCAMs[A]. Proceedings of the 20th International Conference on Advanced Information Networking and Applications[C]. Vienna, Austria, 2006. 249-254.
  • 8MOORE A, ZUEV D, CROGAN M. Discriminators for Use in Flow- Based Classification[R]. RR-05 13 Department of Computer Science, University of London, 2005.
  • 9LI Y F, QIU H, LAN J L. Status quo and outlook of reconfigurable re- search[J[. Engineering Sciences, 2008,10(7):82-89.
  • 10BERNAILLE L, TEIXEIRA R, SALAMATIAN K. Early application identification[A]. The 2nd ADETTI/ISCTE CoNEXT Conference[C]. Lisboa, Portugal, 2006. 456-468.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部