期刊文献+

计算机网络访问隔离控制方法研究 被引量:1

Research on Computer Network Access Isolation Control Method
下载PDF
导出
摘要 提出基于可信计算的计算机网络访问隔离控制方法,首先利用小波分析方法完成计算机网络访问分析,然后利用基于频繁IP地址距离算法对危险访问进行识别,分析危险访问特点.在此基础上,根据危险访问特点,利用可信计算技术,建立网络访问隔离控制模型,从而完成计算机网络访问隔离控制系统的总体结构设计,并分析结构中各模块内容.通过分析网络访问隔离控制的安全属性,得到计算机网络访问隔离控制流程,从而实现计算机网络访问隔离控制.实验证明,所提方法能够有效对计算机网络访问进行隔离控制,提高隔离控制的准确度,降低计算机网络访问隔离控制难度,具有良好的使用价值. This access isolation control method of trusted computing based on computer network, using wavelet analysis method to complete the analysis of computer network access, and then use the IP algorithm to address frequent distance access risk identification based on the analysis of risk characteristics, access. Based on this, according to the risk characteristics of access, using trusted computing technology, establishing network access quarantine control model, thus completing the computer network access quarantine overall structure design of the control system, and analyze the content of each module structure. Based on the analysis of the security attributes of network access control, the process of computer network access control is obtained. The experimental results show that the proposed method can effectively control the access of computer network, improve the accuracy of isolation control and reduce the difficulty of computer network access control.
作者 陈滢生
出处 《微电子学与计算机》 CSCD 北大核心 2017年第6期141-144,共4页 Microelectronics & Computer
基金 基金项目:面向中文微博的突发事件检测方法研究(KJ1601601)
关键词 计算机网络 访问隔离 控制方法 computer network access isolation control method
  • 相关文献

参考文献10

二级参考文献137

  • 1王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 2张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 3林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 4MooreD HebelerJ 苏忠 战晓雷译.对等网[M].北京:清华大学出版社,2003..
  • 5Tal Garfinkel, Mendel Rosenblum. A virtual machine introspection based architecture for intrusion detection [ C ]. Proceedings of the 10th Symposium on Network and Distributed System Security(NDSS). Berkeley: USENIX Association ,2003 : 191-206.
  • 6Fiang Xu-xian,Wang Xin-yuan,Xu Dong-yan. Stealthy malware de- tection through VMM-based" out-of-the-box" semantic view recon- struction [C]. Proceedings of the 14th ACM Conference on Com- puter and Communications Security, New York, USA: ACM Press, 2007 : 128-138.
  • 7Sina Bahram,Xuxian Jiang, Zhi Wang, et al. DKSM:subverting virtual machine introspection for fun and profit [C]. Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems, Washington,DC,USA: IEEE Computer Society,2010:82-91.
  • 8Zhang You-hui, Gu Yu, Wang Hong-yi, et al. Virtual-machine- based intrusion detection on file-aware block level storage [ C ]. Proceedings of the 18th International Symposium on Computer Ar- chitecture and High Performance Computing, Washington, DC, USA: IEEE Computer Society ,2006 : 185-192.
  • 9Chen Shao-long. Network access control system model research based on virtualization ~D]. Beijing: Beijing University of Posts and T,.
  • 10Liu Fa-gui, Su Xiang, Liu Wen-qian. The design & application of Xen-based host system firewall and its extension [C]. 2009 Inter- national Conference on Electronic Computer Technology, Washing- ton, DC,USA. IEEE Computer Society,2009:392-395.

共引文献242

同被引文献18

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部