期刊文献+

陌生网络边界防火墙规则配置方法研究 被引量:4

Study on Configuration Methods of Unacquainted Network Edge Firewall Rules
下载PDF
导出
摘要 文章分析了防火墙工程部署中陌生网络边界问题的产生原因与危害,归纳了应对这一问题的3种传统方法。结合在大型网络中的工程实施经验,提出了解决陌生网络边界访问规则配置问题的"需求分析—日志挖掘"技术体系。基于调研案例分析和管理心理学,对体系中的需求分析法进行了具体设计;基于数据库技术和防火墙日志分析技术,对体系中的日志挖掘法进行了具体设计。使用市场主流防火墙产品,对文章提出的方法进行了测试与验证。 This article summarizes the reason and damage of unacquainted network edge problem in ifrewall engineering conifguration, proposes three traditional solutions to this problem. Combining project experiences in large network, a demand analysis and log-exploring technical system is put forward as a new solution to conifgurate unacquainted network edge access rules. Based on many case studies and managerial psychology, demand analysis method is detailed design. Based on database and ifrewalls log analysis technology, log-exploring method is detailed design. The method in this article has been test and proven to be successful by using the mainstream ifrewall.
作者 王一飞
出处 《信息网络安全》 2014年第9期161-164,共4页 Netinfo Security
关键词 网络访问控制 防火墙 陌生网络边界 需求分析 日志挖掘 network access control ifrewall unacquainted network edge demand analysis log-exploring
  • 相关文献

参考文献4

  • 1王一飞,程彤,冯宇平.过量规则下网络访问控制方法[J].计算机工程,2008,34(2):124-126. 被引量:3
  • 2卢卡斯.防火墙策略与VPN配置[M].北京:水利水电出版社,2008.
  • 3冯登国’徐静.网络安全原理与技术(第2版)[M].北京:科学出版社’ 2010.
  • 4Tanenbaum AS. Computer Network[M]. New Jersey: PrenticeHall, 2003.

二级参考文献2

  • 1Tanenbaum A S. Computer Networks[M]. 4th ed. New Jersey: Prentice Hall, 2003.
  • 2Pfleeger C P, Pfleeger S L. Security in Computing[M]. 3rd ed. New Jersey: Prentice Hall PTR, 2002.

共引文献2

同被引文献32

  • 1项阳.中国IPv6 20年:在探索中创新发展[J].中国教育网络,2023(7):16-18. 被引量:1
  • 2周琰.SQL注入检测方法的研究与实现[D].西安:西北大学,2011.
  • 3GOULD C, SU Z, DEVANBU P. JDBC Checker: A Static Analysis Tool for SQL/JDBC Applications [C]//In Proceedings of the 26th International Conference on Software Engineering (ICSE2004), IEEE Computer Society, Los Alamitos, USA, 2004: 697-698.
  • 4HALFOND W G J, ORSO A. AMNESIA: Aralysis and Monitoring for Neutralizing SQL-lnjection Attacks[C]//ln Proceedings Of the 20th IEEE and ACM International Conference on Automated Software Engineering (ASE2005), Long Beach, California, USA, 2005:174-183.
  • 5AMORIM AAD, COLLINS N, DEHON A, et al. A Verified Information-Flow Architecture[C]//ln Proceedings Of 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL2014), San Diego, CA USA. 2014: 165-178.
  • 6NGUYEN-TUONG A, GUARNIERI S, GREENE D, et al. Automatically hardening web applications using precise tainting[C]// In Proceedings of the 20th IFIP International Information Security Conference, Makuhari-Messe, Chiba, Japan, 2005: 372-382.
  • 7Mckeown N, Anderson T, Balakrishnan H, et al. OpenFlow: Enablinginnovation in campus networks[J]. ACM SIGCOMM Computer Communication Review, 2008,38(2):69-74.
  • 8Elliott C. GENI: Opening up new classes of experiments in global networking[J]. IEEE lnternet Computing, 2010,14(1):39-42.
  • 9ThomasD.Nadeau,KenGray.软件定义网络[M].北京:人民邮电出版社.2014.
  • 10冯邦彦.澳门经济适度多元化的路向与政策研究[J].广东社会科学,2010(4):88-94. 被引量:30

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部