期刊文献+

一种云环境下防火墙策略异常处理的优化方法

An Optimized Method of Solving Policy Anomalies in Firewall in Cloud Environment
下载PDF
导出
摘要 针对传统防火墙策略异常处理方法在云环境下效率低的问题,提出一种基于规则风险值和堆排序的优化方法.基于CVSS通用漏洞评估系统标准,结合BP神经网络自学习原理,建立策略风险评估模型,计算规则的风险值.根据策略风险值优化冲突异常处理算法,并引入堆排序提高冗余异常处理的效率.对比实验表明,改进后的方法能很好地处理冲突异常和冗余异常,提高了防火墙效率. Considering that the traditional method of solving policy anomalies in firewall is inefficient in cloud environment,the paper proposed an optimized method based on risk value of firewall rules and heap sort algorithm. One risk evaluation model is established to calculate the risk value of rule,using the combination of CVSS and BP neural network self-learning methods.According to risk value of firewall rules,the conflict abnormality will be solved,and the heap sort algorithm will be introduced to solve the redundant abnormality.The comparative experiments show that the improved method can well deal with conflict abnormality and redundant abnormality, improving the efficiency of the firewall.
作者 杨川 刘丹
出处 《微电子学与计算机》 CSCD 北大核心 2015年第9期45-48,53,共5页 Microelectronics & Computer
关键词 云环境 防火墙策略异常 BP 神经网络 评估模型 CVSS cloud environment policy anomalies in firewalls CVSS BP neural network evaluation model
  • 相关文献

参考文献12

  • 1Yuan L, Chen H, Mai J, et al. Fireman: a toolkit for firewall modeling and analysisEC// IEEE Symposium on Security and Privacy. Berkeley, 2006: 15-213.
  • 2Alfaro J G, Boulahia C N, Cuppens F. Complete anal- ysis of configuration rules to guarantee reliable net- work security policies[J]. International Journal of In- formation Security, 2008,7(2) : 103-122.
  • 3Hu H, Ahn G J, Kulkarni K. Detecting and resolving firewall policy anomalies [J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9 ( 3): 318-331.
  • 4A1-Shaer E, Hamed H, Boutaba R, et al. Conflict classification and analysis of distributed firewall poli- cies[J]. Selected Areas in Co unications, 2005, 23 (10) : 2069-2084.
  • 5蒋杨永,蒋建华.基于BP神经网络的虚拟企业风险评价研究[J].计算机仿真,2009,26(12):261-264. 被引量:6
  • 6Abedin M, Nessa S, Khan L, et al. Detection and res- olution of anomalies in firewall policy rules[J]. Berlin: Springer, 2006 : 15-29.
  • 7Bryant R E. Graph-based algorithms for boolean func- tion manipulation[J]. IEEE Transactions on Comput- ers, 1986,100(8) : 677-691.
  • 8王秋艳,张玉清.一种通用漏洞评级方法[J].计算机工程,2008,34(19):133-136. 被引量:13
  • 9Hu H, Ahn G J, Kulkarni K. Detecting and resolving firewall policy anomalies[J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9 (3): 318-331.
  • 10Deboosere L, Vankeirsbilck B, Simoens P, et al. Cloud-based desktop services for thin clients[J]. Inter- net Computing, IEEE, 2012,16(6): 60-67.

二级参考文献11

  • 1Luis L Martins, Lucy L Gilson, M Travismaynard. Virtual Teams: What Do We Know and Where Do We Go From Here? [J]. Journal of Management, 2004,30(6): 805-835.
  • 2M T Martinez, et al. Virtual enterprise organization, evolution and control[ J]. International Journal of Production Economics, 2001, 74(1 -3) : 237 -250.
  • 3J Hallikas, et al. Risk management processes in supplier networks [ J]. International Journal of Production Economics, 2004, 90 (1) :47 -58.
  • 4M C Lacity, L R Willcocks & D F Feeny. IT Outsourcing: Maximize Flexibility and Control[ J]. Harvard Business Review, May- June, 1996.84 -93.
  • 5K H Park, J Favrel. Virtual enterprise - information system and networking solution [ J ]. Computers and Industrial Engineering, 1999, 37(1): 441 -444.
  • 6M Zweiacker, et al. Virtual enterprise generic applications, Proceedings of the IEEE International Workshop on Research Issues in Data Engineering 1999 [ M ]. IEEE Comp Soc, Los Alamitos, CA, USA. 92 - 94.
  • 7National Vulnerability Database[Z]. (2007-08-08). http://nvd.nist. gov/.
  • 8Mell P, Scarfone K, Rornanosky S. A Complete Guide to the Common Vulnerability Scoring System Version 2.0[Z]. (2007-07-06). http://www.first.org/cvss/cvss-guide.html.
  • 9Microsoft 的IT安全实践[Z]. (2004-04-20). http://www.microsoft. com/china/technet/itsolutions/msit/security/mssecbp.mspx#EIB AC.
  • 10Threat Severity Assessment[Z]. (2006-12-12). http://www.symantec com/avcenter/threat.severity.html.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部