期刊文献+

分布式防火墙的研究与设计 被引量:2

Research and Design of Distributed Firewalls
下载PDF
导出
摘要 互联网因连通性、开放性方便而广泛使用,但也存在各种不安全因素。传统防火墙作为基本的网络安全设备,根据人为定制的策略,对网络数据进行双向过滤和检查,确保内网安全。然而,随着网络技术日新月异,越来越多的连接技术和加密方式的出现,传统边界防火墙的局限性开始显现。为了克服这些缺点,在保留其优点的同时,分布式防火墙开始进入人们的视野。为此对分布式防火墙开展分析与研究,提出利用现有的技术开展分布式防火墙系统的设计,即防火墙在网络边缘保护安全的同时,将其引申至内网,进而搭建一个内外防护的安全系统。 The powerful function of the Internet comes from the connectivity and openness of the Internet,but it also leads to certain insecurities. As a common network security technology,traditional firewalls set up firewalls between intranets and extranets. According to the preset policy,the network data is filtered and checked to protect the internal network. However,with the rapid development of the Internet,more and more connection methods and encrypted communication emerged,and then the limitations of traditional border firewalls began to appear. To overcome these shortcomings while retaining theadvantages,the distributed firewalls began to enter people's sight. Thus thisarticleanalyses and studies distributed firewalls,and proposes to use existing technologies to design distributed firewall systems,whichis,while retaining traditional border firewalls,to extend the firewall to the internal network,and then build a multi-level and a full range of security systems for internal and external defense.
作者 薛朝慧 □XUE Chaohui(Shaanxi BC&TV Network Intermediary(Group)Co.,Ltd,Xi,an 710061,China)
出处 《中国有线电视》 2018年第9期1051-1054,共4页 China Digital Cable TV
关键词 分布式防火墙 网络数据 边界防火墙 NETFILTER框架 distributed firewall network data border firewall netfilter framework
  • 相关文献

参考文献5

二级参考文献13

  • 1冯运波.防火墙技术的演变[J].计算机安全,2005(5):13-15. 被引量:7
  • 2魏衍君,沈祥鸿.基于移动Agent的分布式入侵检测系统设计与实现[J].微计算机信息,2006(05X):43-45. 被引量:6
  • 3陈彩红,李军.入侵检测技术和防火墙技术结合的探讨[J].太原科技,2007(5):55-56. 被引量:2
  • 4Bellovin S M.Distributed Firewalls[EB/OL].http://www.research.alt.com/~smb/papcrs/distfw.pdf.2004-06-25.
  • 5Bartal Y, Mayer A, Nissim K, et al. A Novel Firewall Management Toolkit. In Proceedings of the IEEE Computer Society Symposium on Security and Privacy, 1999:17-31.
  • 6Bellovin S M. Distributed Firewalls. login: Magazine, Special Issue on Security, 1999-11:37-39.
  • 7loannidis S, Keromytis A D, Bellovin S M, et al. Implementing a Distributed Firewall. In: 7th ACM Conference on Computer and Communications Security, Athens, Greece, 2000-11: 190-199.
  • 8Crosbie M, Spoard E. Defending A Computer System Using Autonomous Agents. In: Processing of 18^th National Information System Security Conference, 1995:549-558.
  • 9Grosof C B, Harrison C, Levine D, et al. Itinerant Agents for Mobile Computing. IEEE Personal Communications Magazine, 1995, 2(5):34-49.
  • 10刘大有,杨鲲,陈建中.Agent研究现状与发展趋势[J].软件学报,2000,11(3):315-321. 被引量:313

共引文献14

同被引文献14

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部