期刊文献+

基于防火墙的企业网络安全设计与实现 被引量:3

下载PDF
导出
摘要 计算机技术的普遍应用,为企业搭建了多业务、多需求的发展平台,为企业发展提供了极大的发展空间。但由于各类病毒、木马对计算机系统的攻击、破坏,严重威胁了企业信息网络的正常运行。防火墙作为一种应用广泛的网络安全手段,通过对网络数据报文的分析、检测、过滤合法流量和非法流量,区分进行保护或抵御。本文主要以基于防火墙的企业网络安全设计与实现为研究多项,就相关概念,防火墙类型及工作原理,以及防火墙在网络安全中的应用进行分析,以其丰富相关的研究成果。
作者 郭璐 曹佳佳
出处 《计算机光盘软件与应用》 2015年第3期181-181,183,共2页 Computer CD Software and Application
  • 相关文献

参考文献2

二级参考文献9

  • 1GOUDA M, LIU X. Firewall Design: Consistency, Completeness,and Compactness[ A]. Proceedings of the 24th IEEE International Conference on Distributed Computing Systems (ICDCS'04)[ C],March 2004.
  • 2Al-SHAER E, HAMED H. Management and translation of filtering security policies[ A]. IEEE International Conference on Communications[C], May 2003.
  • 3Al-SHAER E, HAMED H. Firewall policy advisor for anomaly detection and rule editing[ A]. IEEE/IFIP Integrated Management IM'2003[ C], March 2003.
  • 4Al-SHAER E, HAMED H. Design and Implementation of Firewall Policy Advisor Tools [ R]. Technical Report CTI-techrep0801,School of Computer Science Telecommunications and Information Systems, DePaul University, August 2002.
  • 5HARI B, SURI S, PARULKAR G. Detecting and Resolving Packet Filter Conflicts[A]. Proceedings of IEEE INFOCOM'2000[ C],March 2000.
  • 6BABOESCU F, VARGHESE G. Fast and scalable conflict detection for packet classifiers[ A]. Proceedings of the 10th IEEE International Conference on Network Protocols[C], 2002.
  • 7WANG D, HAO RB, LEE D. Fault Detection in Rule-Based Software Systems[ J]. Concordia Prestigious Workshop on Communication Software Engineering, Montréal, Canada, Sept. 2001. Extended version to appear in the International Journal of Information and Software Technology, Elsevier, 2003, (45): 865 -871.
  • 8WOOL A. A quantitative study of firewall configuration errors[ J].IEEE Computer Society, June 2004:62 -67.
  • 9HAN J, KAMBER M. Data Mining: Concepts and Techniques[ M].Morgan Kaufmann, 2000.

共引文献7

同被引文献15

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部