期刊文献+

基于云查杀技术的轻量级局域网信息保护机制研究

Lightweight LAN Information Security Protection Mechanism Based on Cloud Security
下载PDF
导出
摘要 文章基于云查杀技术,设计并实现了一个轻量级的局域网信息保护机制。该机制主要围绕局域网内的路由器做安全防护,可以截获试图非法修改路由器配置信息的数据包,弹出相应的提示信息;将网内某台主机作为云检测端,维护一个相关配置信息的数据库(如DNS库,库中维护相应信息的黑名单和白名单),周期性地对网内终端进行扫描,查看每个终端的配置信息,与配置信息数据库中的数据进行比对,并根据规则在需要的情况下对终端做相应的重新配置或向终端用户及管理员发出警告。该机制借鉴了云查杀的理念,将其从公网移植到了局域网,弥补了一般网络入侵检测机制缺乏应用层分析手段的弊端。针对目前家庭路由器用户普遍缺乏安全保护意识,不懂如何进行家庭网络防护的问题,文中机制不需要用户具备信息安全方面知识,对普通用户十分友好,在家庭局域网中具有广阔的应用前景。 This paper designed and implemented a cloud-based lightweight local area network (LAN) information security protection mechanism. This mechanism mainly protects the safety of touters inside a LAN by capturing the illegal packets which trying to modify configurations of routers and warning the users. Some computer acts as the detector in the cloud, maintains a database containing configurations, such as black and white lists of DNS servers, scans every terminals in the network periodically, lookups their configurations, compares them with data in the database and resets them if necessary according to the rules or warns the administrator. It borrowed the idea of cloud security in the Internet and applied to intranets and makes up the malpractice of normal intrusion detection system lacking of analysis on application layer. It is very friendly to normal users, as they don't need a lot of information security knowledge, which results in a wide application foreground in home LANs.
出处 《信息网络安全》 2015年第1期56-60,共5页 Netinfo Security
基金 国家国际科技合作专项[2013DFM10100]
关键词 局域网 路由器 入侵检测系统 云查杀 LAN router 1DS cloud security
  • 相关文献

参考文献9

二级参考文献66

  • 1郑光明,胡博.基于MD5的文件完整性检测软件设计[J].湖南理工学院学报(自然科学版),2007,20(1):35-38. 被引量:8
  • 2谭文,杨潇,邵坚磊,等.Windows内核安全编程[M].北京:电子工业出版社,2009.
  • 3刘杰.反病毒技术及其发展趋势[EB/OL].http://tech.sina.com.cn/s/s/2004-11-02/1432452445.shtml,2004-11-02/2011-06-02.
  • 4MarkERussinovich,DavidASolomon.MicrosoftWindowInternal[M].潘爱民,洋.北京:电子工业出版社,2007:622649.
  • 5Nagar P,. Windows NT File System Internals[M]. New York: O Reilly & Associates, 1997:26 38.
  • 6林海元,吕丽民.基于Windows义什系统做过滤驱动模型的文什透明加解密系统的研究与实现[D].杭州:浙江工业大学,2010.
  • 7Microsoft Corporation . Filter Driver Development Guide [EB/OL]. http://download microsoft, corn/download/e/b/a/ eba1050f-a31d-436b-9281-92cedfeae4645/FilterDriverI)eveloperGuide, doc, 2004.
  • 8Schneier B. Attack Trees: Modeling Security Threats[J]. Dr Dobbs Journal, 1999, 24(12): 21-29.
  • 9Charles Petzold.Programming Windows[Z]. Microsoft Press,1998.
  • 10Jetfrey Richter. Programming Applications for Microsoft Windows Fourth Editio[Z]. Microsoft press,1999.

共引文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部