期刊文献+

基于Octeon多核网络处理器的IPv6联动IPS研究与设计 被引量:2

Research and Design of Linked IPS Based on Octeon Multi-core Network Processor for IPv6
下载PDF
导出
摘要 对基于Octeon多核网络处理器的新一代IPv6高速网络联动入侵防御系统进行研究,设计了新型联动入侵防御原型.系统基于Octeon多核的高速处理,并结合了IPv6网络中入侵的新特点.在基于入侵检测规则库规则匹配技术的基础上,运用新型的协议分析技术和基于流的检测技术,在Octeon多核间分配控制层与数据层的不同执行,采用命名块机制进行多核间通信,通过数据层核向控制层核的反馈,实现了流处理及协议分析模块与控制模块的高速联动.系统实现了Gbps级的高速入侵检测与联动防御处理. The paper has made research to the Linked Intrusion Prevention System based on Octeon multi-core network processor for new generation high-speed IPv6 network.,and designed a new type of prototype.The system design is based on high-speed processing on Octeon multi-core,and combines new intrusion characteristics occurred in IPv6 network.On the basis of the technique of matching rules in rule library for intrusion detection,and using the new protocol analysis and flow-based detection techniques,the different executions including control plane and data plane are distributed on multiple cores of Octeon.Adopting the mechanism of named blocks to communicate between multiple cores,and by means of the feedbacks from the cores running data plane code to the control plane core,the system has realized the high-speed linking between the flow processing,protocol analysis module and the control module,which is competent for the high-speed intrusion detection and linked prevention at Gbps level.
出处 《微电子学与计算机》 CSCD 北大核心 2011年第12期79-83,88,共6页 Microelectronics & Computer
基金 国家自然科学基金(61070170) 江苏省高校自然科学研究计划项目(08KJB520011)
关键词 OCTEON 多核 IPV6 IPS 联动 Octeon multi-core IPv6 IPS linking
  • 相关文献

参考文献8

  • 1Carlos E Caicedo, James B D Joshi, Summit R Tu- ladhar. IPv6 security ehallenges[J]. Computer, 2009, 42(2) :36-42.
  • 2廖海宁.高效可扩展路由器命令行接口的实现[J].计算机工程,2004,30(19):173-175. 被引量:3
  • 3陈晓梅.入侵检测产品的评价研究[J].微电子学与计算机,2005,22(9):74-76. 被引量:5
  • 4贺文华,陈志刚,胡玉平.基于IPv6的网络安全与性能分析[J].微电子学与计算机,2007,24(10):120-122. 被引量:7
  • 5Rajahalme J, Conta A, Carpenter B. IPv6 flow label specification [ J ]. Request for Comments, 2004, RFC 3697.
  • 6QingLi,TatuyaJinmei,KeiichiShima.IPv6详解[M].北京:人民邮电出版社,2009:131-142.
  • 7OCTEON Software Overview [ R ]. Cavium Networks, 2008.
  • 8The Hacker's Choice (THC). [EB/OL]. [2011-03- 10]. http://www, thc. org/ download, php? t= r&f=thc-ipv6 -1.4. tar. gz/.

二级参考文献13

  • 1卞斌.IPV6中的安全协议及安全问题[J].信息安全与通信保密,2006,28(1):50-52. 被引量:5
  • 2刘淑芝,吴海涛.IPv6之后的网络安全问题分析[J].计算机技术与发展,2006,16(8):243-244. 被引量:8
  • 3Debar H, Dacier M. Towards a Taxonomy of Intrusion-detection Systems. Computer Networks and ISDN Systems,1999, 31(8):805~822.
  • 4Ilgun Koral Kemmerer, Richard A. Porras. State Transition Analysis: a Rule-based Intrusion Detection Approach.IEEE Transactions on Software Engineering, 1995,21 (3):181~199.
  • 5Rapid Logic Inc. RapidControl for CLI User Guide. 2001
  • 6Cisco Systems, Inc. Cisco IOS Software Command Summary. 1996
  • 7Cisco Systems, Inc. Introduction to Cisco Router Configuration:Student Guide. 1996
  • 8.华为Quidway路由器技术文档VRP1.6用户参考手册[Z].,2002..
  • 9Some Intemet architectural guidelines and philosophy.2002
  • 10Sangheon P,Choi Yanghee.A study on per formance of hierarehical mobile IPv6 in IP-baced cellular networks[C].IEICE Transactions on Communiactions,2004,vE87-B(n3):462-469

共引文献12

同被引文献3

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部