期刊文献+

一种基于状态监测的防火墙 被引量:3

A State Inspection-based Firewall
下载PDF
导出
摘要 在OpenBSD系统上开发了一种基于状态检测的防火墙,并开发了内置的检测和防范几种常见网络攻击(syn flood、端口扫描、分片攻击、icmp flood、smurf)的功能。由于大多数这种攻击总是用假冒的源地址和随机的源端口来产生攻击包,因此这种防范模型比入侵检测系统的检测-修改防火墙策略模型更为有效。 This paper develops a state inspection-based firewall on OpenBSD system, and develops a buildin function to detect and block some normal network attacks (syn flood, port scan, fragment attack, icmp flood, smurf ). This defense model is more effective than IDSs model which detectes attacks and changes firewall policies, because most attacks of these types always generate packets with spoof source address and random port.
出处 《计算机工程》 CAS CSCD 北大核心 2004年第2期144-145,共2页 Computer Engineering
关键词 防火墙 状态监测 网络攻击 端口扫描 Firewall Stateful inspection Network attacks Port scan
  • 相关文献

参考文献6

  • 1[1]Check Point Software Technologies Co. Ltd. Stateful Inspection Technology. http://www.cheekpoint.com/, 1999
  • 2[2]SYN Flooding and IP Spoofing Attacks. http://www.cert.org/advisories /CA-1996-21 .html, 1996
  • 3[3]Distributed Denial of Service Tools. http://www.cert.org/incident_notes /IN-99-07.html, 1999
  • 4[4]Postel J B, Reynolds J K. File Transfer Protocol (FTP). RFC 959, http://www. ietf. org/, 1985
  • 5[5]Noureldien N A,Osman I M.A Stateful Inspection Module Architecture. TENCON 2000, Proceedings, 2000, 2:259 -265
  • 6[6]Spitzner L. Understanding the FW-I State Table. http://www.enteract.com/~lspitz/fwtable.html, 2000-11

同被引文献13

  • 1李永禄,秦华,王巍.Linux内核状态检测防火墙的研究与分析[J].无线电通信技术,2005,31(1):1-3. 被引量:3
  • 2安金萍,张景,李军怀.状态检测包过滤技术在Linux下的实现[J].计算机工程,2005,31(2):141-143. 被引量:11
  • 3Li li-qiu,George Varghese,Subhash Suri. Fast Firewall Implementations for Software and Hardware based Routers[C ].In :Proceeding of ACM SIGMETRICS,Cambridge MA USA,2001.
  • 4Sotiris Ioannidis,Angelos D Keromytis,Steve M Bellovin et al. Implementing a Distributed Firewall [ C ].In : Proceeding of CCS' 00, Athens Greece, 2000.
  • 5Marcus Goncalves,Steven Brown.Check Point Firewall-1 Administration Guide[M].McGraw-Hill Professional,2000.
  • 6Douglas E Comer. Internetworking With TCP/IP Vol. Ⅰ:Principles,Protocols,and Architecture [ M ].Third Edition, Prentice Hall, 1998.
  • 7Noureldien N A,Osman I M.A Stateful Inspection Module Architecture[J].TENCON 2000 Proceedings,2000 (2):259-265
  • 8Stephen Gill.Maximining Firewall Availability[EB/OL].2002-05[2006-05-19].http://www.qorbit.net
  • 9Bellovin S M.Security Problems in the TCP/IP Protocol Suite[J].Computer Communications Review,1989,19(2):32-48
  • 10杨子翔,蔡锡钧.Cai Xijun.Network DoS/DDoS 攻擎及預防方法之研究[EB/OL]2000[2006-05-19].http://www.ncku.edu.tw/TANET2000/download/paper/ A3-2tanetI06.doc

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部