期刊文献+

基于RPC模型的访问控制策略压缩算法

AN ALGORITHM OF ACCESS CONTROL POLICY COMPRESSION BASED ON RPC MODEL
下载PDF
导出
摘要 访问控制列表(ACL)提供了对网络设备接口的一种基本访问控制,是维护网络系统安全的重要手段之一。随着网络应用的日益增多,ACL条目也随之增加,使得管理ACL更加困难,降低了网络设备的转发性能。因此对ACL进行压缩显得尤为重要,但该问题已被证明是NP难。针对ACL压缩问题,提出基于矩阵映射和构建独立单元空间集的方法,将其转换为直线多边形的矩形覆盖问题。分析表明该问题的求解近似度可以突破O(logn),为ACL压缩问题的求解提供了新的思路。 Access control list (ACL) provides a basic access control on network device interfaces, and is one of the important means to maintain the security of network systems. However, ACL items have been growing along with the increase of network applications, while increasing the difficulty in ACL management, this also degrades the forwarding performance of network devices as well. Therefore to compress ACL is particularly important, but this problem has been proved to be NP-hard. Aiming at ACL compression problem, the paper proposes an approach based on mapping matrix and constructing independent unit space set to transform the problem into a problem of rectilinear polygon rectangle cover. Analysis shows that the approximation degree of the solution to the problem can break O (logn), this offers a new thought for solving ACL compression problem.
出处 《计算机应用与软件》 CSCD 2016年第2期330-333,共4页 Computer Applications and Software
基金 湖南省教育厅科技项目(13C1049)
关键词 访问控制列表 网络安全 规则压缩 RPC 矩形覆盖 ACL Network security Rule compression Rectilinear polygon cover (RPC) Rectangle cover
  • 相关文献

参考文献13

  • 1曾旷怡,杨家海.访问控制列表的优化问题[J].软件学报,2007,18(4):978-986. 被引量:11
  • 2Rottenstreich O, Cohen R, Raz D, et al. Exact worst case TCAM rule expansion[ J ]. IEEE Transactions on Computers, 2013,62 ( 6 ) : 1127 - 1140.
  • 3Meiners C R,Liu A X,Torng E. Bit Weaving:A non-prefix approach to compressing packet classifiers in TCAMs [ J ]. IEEE Trans on Networ- king,2012,20(2) :488 -500.
  • 4Applegate D A, Calinescu G, Johnson D S, et al. Compressing rectiline- ar pictures and minimizing access control lists [ C ]//Pine. of the eigh- teenth annual ACM-SIAM symposium on Discrete algorithms, 2007: 1066 - 1075.
  • 5Suri S, Sandholm T, Warkhede P. Compressing two-dimensional routing tables[ J]. Algorithmiea,2003,35 (4) :287 - 300.
  • 6Liu A X, Torng E, Meiners C. Firewall Compressor: An algorithm for minimizing firewall policies [ C ]//Proc. of the 1EEE INFOCOM, April2008. Phoenix, AZ,2008 : 176 - 180.
  • 7Daly J, Liu A X, Torng E. A difference resolution approach to compress- ing access control lists [ C ]//Proc. of the IEEE INFOCOM, April 2013:2040 - 2048.
  • 8Cheng Y,Wang W,Min G,et al. A new approach to designing firewall based on multidimensional matrix [ J ]. Concurrency and Computation: Practice and Experience,2013,11 (27) : 1 - 14.
  • 9Hu H, Ahn G J, Kulkarni K. Detecting and resolving firewall policy a- nomalies[ J]. IEEE Transactions on Dependable and Secure Compu- ting,2012,9(3) :318 -331.
  • 10O' rourke J, Supowit K. Some NP-hard polygon decomposition problems [ J ]. 1EEE Transactions on Information Theory, 1983,29 (2) : 181 - 190.

二级参考文献8

  • 1Xu K,Xu MW,Wu JP,Wu J.Survey on routing lookup algorithms.Journal of Software,2002,13(1):43-50 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/13/43.pdf
  • 2Zhou W,Meinel C.Implement role based access control with attribute certificates.In:Proc of the ICAC T2004.IEEE Press,2004.536-541.http://citeseer.ist.psu.edu/702966.html
  • 3Colton A.Cisco IOS for IP Routing.3rd ed.,Rocket Science Press,Inc.,2003.
  • 4Hari A,Suri S,Parulkar G.Detecting and resolving packet filter conflicts.In:Proc.of the INFOCOM 2000.Tel Aviv:IEEE Press,2000.1203-1212.http://www.microolap.com/downloads/files/pssdk/literature/hari00detecting.pdf
  • 5Cisco.User guide for ACL manager,software release 1.5.2003.233-242.http://www.cisco.com/en/US/products/sw/cscowork/ ps402/products_user_guide_chapter09186a008017addf.html
  • 6Bukhatwa F,Patel A.Effects of ordered access lists in firewalls.In:Michael L,ed.Proc.of the IADIS WWW/Internet 2003,ICWI 2003.Algarve:IADIS Press,2003.257-264.http://www.sigmod.org/dblp/db/conf/iadis/icwi2003.html
  • 7Grout V,McGinn J.Optimization of policy-based internet routing using access control lists.In:Proc.of the IFIP/IEEE Int'l Symp.on Integrated Network Management (IM 2005).Nice:IEEE Press,2005.http://www.newi.ac.uk/groutv/Papers/IEEE_IM_ACLs.pdf
  • 8Grout V,McGinn J,Davies J.Reducing processing latency in network packet filters.In:Proc.of the 5th Int'l Network Conf.(INC 2005).Samos Island,2005.3-10.http://www.newi.ac.uk/groutv/Papers/RPLinNPF.pdf

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部