期刊文献+

工业防火墙规则自学习算法设计 被引量:8

Industrial firewall rules self-learning algorithm design
下载PDF
导出
摘要 针对工控网络新型攻击手段层出不穷,工业防火墙规则设置和管理日趋复杂的情况,提出一种工业防火墙规则自学习算法的设计方案。利用改进的BP神经网络对防火墙的日志文件进行深度分析,学习出正常数据流的通讯模式,根据提取的数据包特征信息,推理相应防火墙规则策略,自动生成新的防火墙规则。实验结果表明,该算法成功生成了防火墙规则,准确率较高,实现了工业防火墙的智能性和安全性。 For new attack methods emerging endlessly,and for that industrial firewall rules setting up and managing are in a complex situation,an industrial firewall rules self-learning algorithm was proposed.By analyzing the depth of firewall log file,the normal communication mode of data flow was studied,characteristic information of the data packets was extracted,the corresponding strategy of firewall rules was reasoned out,and the new firewall rules were generated automatically.Experimental results show that this algorithm can generate the firewall rules successfully,and the accuracy is higher,and the intelligence and security of the industrial firewall are realized.
出处 《计算机工程与设计》 北大核心 2016年第12期3141-3145,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(61501447)
关键词 工控网络 工业防火墙 规则自学习 BP神经网络 网络安全 industrial network industrial firewall firewall rules self-learning algorithm BP neural network cyber security
  • 相关文献

参考文献2

二级参考文献102

  • 1彭永光,张颖江.免疫原理在主动防御型防火墙中的应用[J].微机发展,2005,15(12):167-168. 被引量:1
  • 2王志伟,郭文东.基于Snort的入侵防御系统的技术研究和实现[J].河北科技大学学报,2005,26(4):316-321. 被引量:6
  • 3李鑫,季振洲,刘韦辰,胡铭曾.防火墙过滤规则集冲突检测算法[J].北京邮电大学学报,2006,29(4):90-93. 被引量:6
  • 4NIST SP800-82.Guide to Industrial Control Systems(ICS)Security[S].Gaithersburg,USA:National Institute of Standards and Technology(NIST),2011.
  • 5Simon H A.The architecture of complexity[C] //Proceedings of the American Philosophical Society.Philadelphia,USA:Batsford,1962:467-482.
  • 6Bishop M.Computer Security[M].Boston,USA:Addison Wesley,2003.
  • 7Department of Homeland Security(DHS).Cyber Security Assessments of Industrial Control System[S].Washington DC,USA:Department of Homeland Security(DHS),2010.
  • 8The European Network and Information Security Agency(ENISA).Protecting Industrial Control Systems,Recommendations for Europe and Member States[R].Heraklion,Greece:Recommendations for Europe and Member States,2011.
  • 9Byres E J,Kay J,Carter J.Myths and facts behind cyber security and industrial control(2003)[Z/OL].(2010-02-12),http://www.pimaweb.org/conference/april2003/pdfs/MythsAndFactsBehindCyberSecurity.pdf.
  • 10David A.Multiple Efforts to Secure Control Systems Are Under Way,but Challenges Remain,GAO-07-1036[R].Washington DC,USA:US Government Accountability Office(US GAO),2007.

共引文献175

同被引文献61

引证文献8

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部