期刊文献+

基于HIP的网络防火墙系统设计与实现 被引量:1

Design and Implementation of HIP-based Network Firewall
下载PDF
导出
摘要 在Internet所使用的TCP/IP协议中,网络层IP地址同时代表了主机标识符和定位符,使得IP地址无法支持主机移动性与多宿主性,更加无法保障用户之间的可信任性。为了解决这一系列问题,文章深入研究了主机标识协议(HIP)的体系结构。该体系通过主机标志层来标志连接终端,加强了安全性和可移动性,满足了人们对保密通信和移动通信上的要求。文章基于ARM嵌入式系统,提出以透明网桥为载体架设防火墙过滤HIP包,达到对一个网段进行网络安全防范的目的。 From de prospective of TCP/IP protocol in Internet,the IP address,which lies upon the network layer,represents the host identifier and locater simultaneously.Such design of the IP address correspondingly sets barriers to the mobility of a single host as well as the implementation of the multi-homed host;furthermore,it fails to provide the guarantee of credence between users.With the advent of Host Identity Protocol(HIP) architecture,which strengthens the security and authentication in the network,in the problems described above could be well solved.HIP connects hosts by means of the identifier of the host identity layer,which enhances security of hosts along with the mobility;meanwhile,it satisfies the demands for secure communication and mobile communication.This paper,based on ARM embedded System,utilizes transparent bridge to filtrate HIP packets,which finally achieves the purpose of security defense in a network segment.
出处 《信息网络安全》 2012年第1期53-57,共5页 Netinfo Security
关键词 防火墙 ARM 主机标示协议 透明网桥 firewall ARM HIP transparent bridge
  • 相关文献

参考文献9

  • 1A Sang, S Li. A. predictability analysis of network traffic[J]. Computer networks, 2002, 39 (04): 329-345.
  • 2K. Park and W. Willinger. Self-Similar Network Traffic: An Overview[C]. New York: John Wiley&Sons,2000.1-46.
  • 3夏正敏,陆松年,李建华,马进.基于自相似的异常流量自适应检测方法[J].计算机工程,2010,36(5):23-25. 被引量:11
  • 4Paul Barford, Jeffery Kline, David Plonka and Amos Ron. A Signal Analysis of Network Traffic Anomalies[C]. Proceedings of ACM SIGCOMM Internet Measurement Workshop,2001.
  • 5Alarcon-Aquino V, Barria JA. Anomaly detection in communication networks using wavelets[C].IEE-Proceedings- Communications,2001,vol. 148,no.6:355 -362.
  • 6A. Lakhina, M. Crovella, and C. Diot, Mining anomalies using traffic feature distributions[C]. In ACM SIGCOMM' 05, 2005. 217-228.
  • 7钱叶魁,陈鸣,郝强,刘凤荣,商文忠.ODC——在线检测和分类全网络流量异常的方法[J].通信学报,2011,32(1):111-120. 被引量:12
  • 8Andreas Kind, Marc Ph. Stoecklin, and Xenofontas Dimitropoulos. Histogram-Based Traffic Anomaly Detection[C]. IEEE TRANSACTIONS ON NETWORK SERVICE MANAGEMEN, VOL. 6, NO. 2, JUNE 2009.
  • 9G. W. Milligan and M. Cooper, An examination of procedures for determining the number of clusters in a data set[C]. Psychometrika, vol. 50, 1985.159-179.

二级参考文献20

  • 1杨一,郑建德.基于蚂蚁聚类的自适应拒绝服务攻击检测技术[J].通信学报,2006,27(z1):88-91. 被引量:1
  • 2孙知信,唐益慰,张伟,宫婧,王汝传.基于特征聚类的路由器异常流量过滤算法[J].软件学报,2006,17(2):295-304. 被引量:15
  • 3任勋益,王汝传,王海艳.基于自相似检测DDoS攻击的小波分析方法[J].通信学报,2006,27(5):6-11. 被引量:56
  • 4Leland W E, Taqqu M S, Willinger W, et al. On the Self-similar Nature of Ethernet Traffic(Extended Version)[J]. IEEE/ACM Transactions on Networking, 1994, 2(1): 1-15.
  • 5Li Ming. Change Trend of Averaged Hurst Parameter of Traffic Under DDOS Flood Attacks[J]. Computers & Security, 2006, 25(3): 213-220.
  • 6Stoev S, Taqqu M S, Park C, et al. On the Wavelet Spectrum Diagnostic for Hurst Parameter Estimation in the Analysis of Internet Traffic[J]. Computer Networks, 2005, 48(3): 423-445.
  • 7XU K, ZHANG Z L, BHATTACHARYYA S. Intemet traffic behavior profiling for network security monitoring[J]. IEEE/ACM Transactions on Networking, 2008, 16(6):1241-1252.
  • 8LAKHINA A, CROVELLA M, DIOT C. Mining anomalies using traffic feature distrlbutlons[A]. SIGCOMM[C]. Philadelphia, Pennsylvania, USA, 2005.134-145.
  • 9TORRES R, HAJJAT M, RAO SG, et al. Inferring undesirable behavior fiom P2P traffic analysis[A]. SIGMETRICS[C]. USA, 2009. 231-242.
  • 10GU G, PERDISCI R, ZHANG J, et al. BotMiner: clustering analysis of network traffic for protocol and structure-independent botnet detection[A]. USENIX Security[C]. USA., 2008.67-76.

共引文献20

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部