期刊文献+

基于嵌入式马尔可夫链的网络防火墙性能建模与分析 被引量:7

Performance modeling and analysis of network firewall based on embedded Markov chain
下载PDF
导出
摘要 提出了一种基于嵌入式马尔可夫链的解析排队模型来分析和研究基于一定准则的防火墙在面对正常流量和DoS攻击时的性能。基于这种排队模型,得到了一组关于防火墙特征和性能的指标计算方法,这对防火墙的设计来说具有重要意义。同时还提出了一种易于实现的算法来得到这种马尔可夫链模型的状态概率,对防火墙的状态和性能也作了深入的分析。最后通过实验分析验证了提出的解析模型的有效性。 This paper presented an analytical queueing model based on the embedded Markov chain to study and analyze the performance of rule-based firewalls when subjected to normal traffic flows as well as DoS attack flows. It derived equations for key features and performance measures of engineering and design significance. Moreover, it proposed an algorithm easy to be implemented to derivate the state probability of the analytic model. In addition, it verified and validated this analytical model using simulation and real experimental measurements.
作者 马永红 高洁
出处 《计算机应用研究》 CSCD 北大核心 2014年第5期1491-1494,1498,共5页 Application Research of Computers
基金 河南省科技攻关计划资助项目(A13060232) 河南省科技厅计划资助项目(132400411191)
关键词 网络防火墙 性能建模 排队论 马尔可夫链 network firewall performance modeling queueing theory Markov chain
  • 相关文献

参考文献11

  • 1Cisco PIX firewall release notes[EB/OL].(2004).http://www.cisco.com/en/US/docs/security/pix/pix62/release/notes/pixrn624.html.
  • 2Linux netfilter[EB/OL].http://www.netfilter.org.
  • 3MELARA A J.Performance analysis of the Linux firewall in a host[D].[S.l.]:California Polytechnic State University,2002.
  • 4Arbor Networks Inc.Worldwide infrastructure security report[EB/OL].http://www.arbornetworks.com/report.
  • 5SALAH K.Queueing analysis of network firewalls[C]// Proc of IEEE Global Telecommunications Conference.2010:1-5.
  • 6SALAH K,QAHTAN A.Implementation and experimental performance evaluation of a hybrid interrupt-handling scheme[J].International Journal of Computers Communications Control,2009,32(1):179-188.
  • 7LAW A,KELTON W.Simulation modeling and analysis[M].2nd ed.[S.l.]:McGraw-Hill,1991.
  • 8LIU A X ,GOUDA M G.Diverse firewall design[J].IEEE Trans on Parallel and Distributed Systems,2008,19(9):1237-1251.
  • 9SALAH K,SATTAR K,SQALLI M,et al.A potential low-rate DoS attack against network firewalls[J].Security and Communication Networks,2011,4(2):136-146.
  • 10Distributed Internet traffic generator[EB/OL].(2008).http://www.grid.unina.it/software/ITG.

同被引文献36

  • 1李林,卢显良,李泽平,聂晓文,彭永祥,李梁.一种适用于Diverse Firewall Design的规则集比较算法[J].四川大学学报(工程科学版),2009,41(5):160-164. 被引量:2
  • 2汤昂昂,陈永波,姬东鸿.一种分布式防火墙规则有效性检测算法[J].微电子学与计算机,2015,32(2):5-9. 被引量:1
  • 3陈莉.计算机网络安全与防火墙技术研究[J].中国科技信息,2005(23A):78-78. 被引量:27
  • 4王卫平,陈文惠,朱卫未,陈华平,杨杰.分布式防火墙策略配置错误的分析与检测[J].中国科学院研究生院学报,2007,24(2):257-265. 被引量:4
  • 5Liu A X, Gouda M G. Diverse firewall design[J]. Par- allel and Distributed Systems, IEEE Transactions on, 2008,19(9) : 1237-1251.
  • 6Liu A X, Gouda M G. Complete redundancy removal for packet classifiers in tcarns[J]. Parallel and Distributed Systems, IEEE Transactions on, 2010,21(4) : 424-437.
  • 7Liu A X. Firewall policy change-impact analysis[J]. ACM Transactions on Internet Technology (TOIT), 2012,11(4) : 15.
  • 8Salah K, Qahtan A. Implementation and experimental performance evaluation of a hybrid interrupt-handling scheme[J]. Computer Communications, 2009,32 (1) : 179-188.
  • 9Zhang J, Li T. Based on the Queuing Model of CAN Bus Simulation and Application[C]//Proceedings of The Eighth International Conference on Bio-Inspired Computing.- Theories and Applications (BIC-TA), 2013,2013 : 631-639.
  • 10Chen F, Liu A X, Hwang J, et al. First step towards automatic correction of firewall policy faults[J]. ACM Transactions on Autonomous and Adaptive Systems (TAlkS), 2012, ? (2) : 27.

引证文献7

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部