期刊文献+

基于LSP与NDIS驱动防火墙的设计与实现

Design and Implementation of Firewall Based on LSP and NDIS
下载PDF
导出
摘要 信息时代个人电脑成为了生活的重要组成部分,对个人防火墙的研究对保护信息安全有重要的现实意义。目前防火墙大多在驱动层面使用包过滤技术,对数据的封包处理能力有限,并且无法接触应用层信息,过滤匹配算法也大多为线性时间算法。为了提高防火墙的过滤能力,文章提出加入LSP过滤技术对网络封包进行全面深度过滤,并改善了匹配算法,设计了一款内核与应用层双重过滤的驱动防火墙。经过测试,它对网络数据包有强大的过滤能力。 Personal computer plays an important role of life in the information age.Therefore it is important and realizable for us to research the firewall.At present,most firewalls use packet filtering technology at the driver level,which has limited processing capacity for data packets,and can not contact the application layer information,and most of the filtering and matching algorithms are linear time.In order to improve the filtering ability of firewall,LSP filtering technology is proposed to filter network packets comprehensively and deeply,and the matching algorithm is improved.A driver firewall with dual filtering of kernel and user layer is designed.After testing,it has a strong filtering ability for network packets.
作者 梅足辉 MEI Zuhui(School of Mechanical Engineering,Jiangsu University of Technology,Changzhou 213001,China)
出处 《现代信息科技》 2020年第12期140-141,144,共3页 Modern Information Technology
关键词 网络驱动接口规范 防火墙 LSP 包过滤 network driver interface specification firewall LSP packet filtering
  • 相关文献

参考文献2

二级参考文献16

  • 1任安西,杨寿保,李宏伟.一种基于统计分析的防火墙规则匹配优化方法[J].计算机工程与应用,2006,42(4):162-164. 被引量:8
  • 2张翼,张勇,汪为农.防火墙过滤规则的建模和全面优化[J].计算机工程与应用,2006,42(6):146-150. 被引量:6
  • 3文军,王加懂.DSP程序在线编程的研究与实现[J].信息安全与通信保密,2007,29(8):193-195. 被引量:11
  • 4H. Hamed,E. Al-Shaer. Dynamic Rule-Ordering Optimization for High-Speed Firewall Filtering[C]. Proceedings of the 2006 ACM Symposium on Information,2009:240-250.
  • 5Korosh Golnabi, Richard K.Min, Latifur Khan, E.Al-Shaer. Analysis of Firewall Policy Rules Using Data Mining Techniques[C]. 2009 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No. 06CH37765C), 305-15P.
  • 6Myung Kun, Yoon Shigang, Chen Zhan Zhang. Reducing the Size of Rule Set in a Firewall[C]. IEEE International Conference on Communications, 2007:1274-1279.
  • 7Tihomir Katic Predrag Pale. Optimization of Firewall Rules[C]. 29th International Conference on Information Technology Interfaces. 2011 : 685-690.
  • 8庄冠夏.防火墙规则冲突检测和次序优化的研究与实现[D].上海:华东师范大学,2011.
  • 9Ranjan S, Swaminathan R, Uysal M, et al. DDoS shield: DDoS - resilient scheduling to counter application layer at- tacks[ J]. IEEE/ACM Transactions on Networking, 2009, 17(1) : 26 -39.
  • 10Kandula S, Katabi D, Jacob M, et al. Botz - 4 - scale : surviving organized DDoS attacks that mimic flash crowds [ C ] Proceedings of the 2rid Conference on Symposium on Networked Systems Design & Implementation. Kyoto, Ja- pan: [s.n.], 2005:287-300.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部