期刊文献+

一种基于MapReduce的防火墙策略冲突并行化检测及消解模型 被引量:6

MapReduce-based Parallelization Model for Firewall Policy Conflict Detecting and Resolving
下载PDF
导出
摘要 防火墙在网络安全中起到很重要的作用,其中防火墙策略中的规则决定了网络数据包被"允许"或被"拒绝"进出网络。对于大型网络来说,由于规则太多,管理者很难保证其中不出现冲突,因此策略中规则冲突的检测及解决成为了保证网络安全的重要方面。提出了一种基于MapReduce模型的防火墙策略冲突检测解决算法,它对由基于规则的分段技术得到的片段进行自定义的排序,之后将其转化为规则的形式来代替原来的规则进行数据包的过滤。片段间两两不相交且匹配的包只执行一种动作,从而消除了冲突。 Firewalls are playing a very important role in network security, because the flrewall policy rules are determi ning that the network packet "Allow" or "Rejected" out of network. For the large networks, the rules are too many to ensure they have not conflict, therefore the detection and resolution of the policy conflict become an important aspect of network security. This paper presented a parallel method of flrewall policy conflict detection and resolution algorithm, which resorts the segments formed by the rule-based segmentation technology, and translates the segments into the form of rules, uses this new rules instead of the original rules for packet filtering. Because all segments are pairwise dis- jointed and every segment has one action, the conflicts in policy are resolved.
出处 《计算机科学》 CSCD 北大核心 2013年第3期50-54,共5页 Computer Science
基金 国家自然科学基金重点项目(61133005) 国家自然基金项目(61070057 61103047) 国家科技支撑计划项目(2012BAH09B02) 教育部科技创新工程重大项目培育资金项目(708066) 教育部博士点基金(20100161110019) 湖南省杰出青年基金(12JJ1011)资助
关键词 防火墙 规则冲突 分段 动作 排序 Rules, Confliction, Segment, Action, Ordering
  • 相关文献

参考文献14

  • 1Al-Shaer E,Hamed H.Discovery of Policy Anomalies in Distributed Firewalls[C] // IEEE INFOCOM '04.vol.4,2004:2605-2616.
  • 2Yuan L,Chen H,Mai J,et al.Fireman:A Toolkit for Firewall Modeling and Analysis[C] //Proc.IEEE Symp.Security and Privacy.2006:15.
  • 3Alfaro J,Boulahia-Cuppens N,Cuppens F.Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies[J].Int'l J.Information Security,2008,7 (2):103-122.
  • 4Hari A,Suri S,Parulkar G M.Detecting and resolving packet filter conflicts[C] //INFOCOM.2000(3):1203-1212.
  • 5Fu Z,Wu S F,Huang H,et al.IPSec/VPN security policy:Correctness,conflict detection,and resolution[C] // Proceedings of Policy2001 Workshop.January 2001.
  • 6Golnabi K,Min R K,Khan L,et al.Analysis of firewall policy rules using data mining techniques[C] // IEEE/IFIP Network Operations and Management Symposium (NOMS 2006).April 2006.
  • 7Hu H,Ahn G J,Kulkarni K.Detecting and resolving firewall policy anomalies[J].IEEE Transactions on Dependable and Se cure Computing,2012,9 (3):318-331.
  • 8Abedin M,Nessa S,Khan L,et al.Detection and resolution of anomalies in firewall policy rules[C] //DBSEC'06 Proceedings of the 20th IFIP WG 11.3 Working Conference on Data and Applications Security.2006:15-29.
  • 9田大新,刘衍珩,李永丽,唐怡.数据包过滤规则的快速匹配算法和冲突检测[J].计算机研究与发展,2005,42(7):1128-1135. 被引量:14
  • 10Al Shaer E,Hamed H,Boutaba R,et al.Conflict Classification and Analysis of Distributed Firewall Policies[J].IEEE Journal on Selected Areas in Communications,2005,23:2069-2084.

二级参考文献65

  • 1张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 2宁焕生,张瑜,刘芳丽,刘文明,渠慎丰.中国物联网信息服务系统研究[J].电子学报,2006,34(B12):2514-2517. 被引量:151
  • 3J Dean,S Ghemawat.MapReduce:Simplified data processing on large clusters[J].Communications of the ACM,2008,51(1):107-113.
  • 4J L Wagener.High performance fortran[J].Computer Standards & Interfaces,Elsevier,1996,18(4):371-377.
  • 5W Gropp,E Lusk,et al.Using MPI:Portable Parallel Programming with the Message Passing Interface[M].Cambridge:MIT Press,1999.1-350.
  • 6A Geist,A Beguelin,et al.PVM:Parallel Virtual Machine:A Users' Guide and Tutorial for Networked Parallel Computing[M].Cambridge:MIT Press,1995.1-299.
  • 7A Verma,N Zea,et al.Breaking the mapreduce stage barrier .Proc of IEEE International Conference on Cluster Computing .Los Alamitos:IEEE Computer Society,2010.235-244.
  • 8H C Yang,A Dasdan,et al.Map-Reduce-Merge:Simplified relational data processing .Proc of ACM SIGMOD International Conference on Management of Data .New York:ACM,2007.1029-1040.
  • 9S V Valvag,D Johansen.Oivos:Simple and efficient distributed data processing .Proc of IEEE International Conference on High Performance Computing and Communications .Piscataway:IEEE,2008.113-122.
  • 10Z Vrba,P Halvorsen,et al.Kahn process networks are a flexible alternative to mapreduce .Proc of IEEE International Conference on High Performance Computing and Communications .Piscataway:IEEE,2009.154-162.

共引文献273

同被引文献48

  • 1张秀岭,万旻,骆建彬,邓宪.Linux下基于Squid的多能代理系统与透明网关解决方案[J].微计算机应用,2004,25(5):534-539. 被引量:5
  • 2韩伟.基于md0叩云计算平台下DDoS攻击防御研究[D].太原:太原科技大学,2011.
  • 3张欣晨,杨庚.Hadoop环境中基于属性和定长密文的访问控制方法[J/0L].计算机工程与应用.http://www.cnki.net/kcma/doi/10.3778/j.issn. 1002 - 8331. 1311 - 0372. html, 2014 - 04-03.
  • 4李克然.基于云计算的电子商务数据管理模式研究[D].西安:西安电子科技大学,2011.
  • 5霍树民.基于Hsdoop的海量影像数据管理关键技术研究[D].长沙:国防科学技术大学,2010.
  • 6杨寅.社会网络分析工具中的分布式最小生成树算法[D].北京:北京邮电大学,2011.
  • 7金松昌,方滨兴,杨树强.基于Hadoop的网络安全日志分析系统[A].第25次全国计算机安全学术交流会论文集·第25卷[C].2010.
  • 8李曼.云计算平台上的增量学习研究[D].南京:南京邮电大学,2012.
  • 9王鄂,李铭.云计算下的海量数据挖掘研究[J].现代计算机,2009,15(11):22-25. 被引量:26
  • 10高岚岚.基于Netfilter架构自适应防火墙设计及实现[J].云南民族大学学报(自然科学版),2010,19(1):74-78. 被引量:1

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部