期刊文献+

灰度布朗运动信息链Web防火墙设计分析

Analysis and Design of Web Firewall Based on Gray Brown Motion Information Chain
下载PDF
导出
摘要 针对传统上采用模糊控制信息链设计防火墙导致攻击序列排队解析模型混乱,抗DDoS攻击的能力非常弱的问题,提出一种基于灰度布朗运动信息链的解析排队模型的Web防火墙设计模型。计算灰度布朗运动信息链模型的状态概率,引入灰度布朗运动信息链理论,设计Web防火墙数学解析模型,对相关的性能关键参数进行分析,引入攻击信息排队论分析机制,构建数据信息链优先链路选择准则,对防火墙的关键性能指标,比如吞吐量、延时、CPU使用率、数据包丢失,得到了这些指标的数学表达式。仿真测试证明该方法构建Web防火墙,参数性能有明显提高,抗攻击能力改进明显。 A queuing model to design the Web firewall based on gray Brown motion information chain is proposed. State probability calculation of gray Brown chain model of motion information is implemented, the motion information of gray Brown chain theory is used, the analytical model of mathematics on the performance of Web firewall design, key parameters are analyzed, the attack information queuing analysis mechanism is cited to construct data information chain precedence link selection criteria. The key performance indicators of the firewall such as throughput, delay, CPU utilization, packet loss, and the mathematical expressions of these indices are obtained. Simulation results show that the method of construct-ing Web firewall, parameters and has a better performance, and anti attack ability is improved obviously.
作者 雷明
出处 《科技通报》 北大核心 2014年第8期56-58,共3页 Bulletin of Science and Technology
基金 国土资源部地学空间信息技术重点实验室项目(KLGSIT2013-10)
关键词 Web防火墙 网络攻击 灰度布朗运动信息链 Web firewall network attack gray Brown motion information chain
  • 相关文献

参考文献5

二级参考文献37

  • 1吴欣,张博,陈涛.基于神经网络的大规模模拟电路故障检测系统[J].计算机测量与控制,2004,12(11):1049-1051. 被引量:9
  • 2曲广强,李丹,常国权.GPRS无线通信模块MC35I及其外围电路设计[J].东北电力大学学报,2006,26(2):79-82. 被引量:22
  • 3Kent S. Security architecture for the internet protocol[S].RFC 2401 Nov,1998.
  • 4Ioannidis J, Bellovin S.Implementing pushback: router-based defense against DDoS attacks[A].Proceedings of Network and Distributed System Security Symposium[C].Catamaran Resort Hotel San Diego, California,February,2002.
  • 5Ahsan H, Mohamed M, Hefeeda, Bharat B. Detecting service violations and DoS attacks[R]. CERIAS Tech Report TR 2002-15.
  • 6Ptacek, Thomas H, Timothy N N. Insertion, evasion, and denial of service: eluding network intrusion detection[C]. January, 1998. http://citeseer.ist.psu.edu/ptacek98insertion.html.
  • 7Matthew V, Mahoney, Philip K C. Learning nonstationary models of normal network traffic for detecting novel attacks[A]. Proceedings of KDD'02[C].Edmonton, Alberta, Canada, February 2002.376-385.
  • 8Stefan A. The base-rate fallacy and its implications for the difficulty of intrusion detection[A].Proceedings of the 6th ACM Conference on Computer and Communications Security[C].Singapore, 1999.1-7.
  • 9Leland W, Taqq M, Willinger W,et al. On the self-similar nature of ethernet traffic[A].Proceedings of ACM SIGCOMM'93[C]. San Francisco, California, August,1993.183-193.
  • 10Han Jiawei,Kamber M. Data mining:concepts and techniques[M].USA:Morgan Kaufmann Publishers,2001.81-93.

共引文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部