期刊文献+

VPN网络中IPSec安全策略的形式化描述 被引量:6

Formal description of IPSec security policy in VPN networks
原文传递
导出
摘要 针对虚拟专用网络中IP安全协议规则制定和配置繁杂、易出现冲突等问题,提出对IP安全协议规则集中的保护访问规则表和保护传输规则表进行形式化,进而采用图形管理的方法,开发出IP安全协议规则分析管理工具软件.通过对真实的IP安全协议规则进行分析检测,该软件判断出规则集中所存在的各类冲突.实验结果表明这种形式化模型能很好地管理IP安全协议规则. The constitution and configuration of IP security protocol (IPSec) rules in virtual private network (VPN) were analyzed. The rule table of protected access and the rule table of protected transmission in IPSec rules set were formalized. The software tool for analyzing and managing IPSec rules were developed by using graphical management methods. By analyzing and detecting the real IPSec rules, the software judged the various conflicts in rules set. The experiment result shows that this formal model really can manage IPSec security rules better
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第4期65-68,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 黑龙江省教育厅指导项目(9553038)
关键词 网络安全 虚拟专用网 IP安全协议 安全策略 形式化模型 规则冲突 network security virtual private network IP security protocol security policy formalmodel rule conflict
  • 相关文献

参考文献10

二级参考文献34

  • 1林晖.浅谈企业信息化中的标准化[J].中国标准化,2005(2):59-61. 被引量:2
  • 2李平均,尚国栋.基于.NET平台的PDM体系结构框架与ERP系统集成研究[J].微电子学与计算机,2005,22(10):58-61. 被引量:2
  • 3Abraham A, Grosan C. Genetic systems programming: theory and experiences (Studies in computational intelligence) [M]. Berlin: Springer-Verlag,2006. 被引量:1
  • 4Sherif J S, Ayers R, Dearmond T G. Intrusion detection: the art and the practice(Part 1)[J]. Information Management & Computer Security, 2003, 11(4) : 175-186. 被引量:1
  • 5Gong R H, Zulkernine M, Abolmaesumi P. A soft-ware implementation of a genetic algorithm based approach to network intrusion detection[C]//Proc of Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/ Distributed Computing and First ACIS International Workshop on Self-assembling Wireless Networks (SNPD/SAWN' 05 ). Towson, Maryland: IEEE Computer Society, 2005: 246-253. 被引量:1
  • 6Lu W, Traore I. Detecting new forms of network in trusion using genetic programming[J]. Computation al Intelligence, 2004, 20(3): 475-494. 被引量:1
  • 7G omez J, Dasgupta D. Complete expression trees for evolving fuzzy elassifier systems with genetic algorithms and application to network intrusion detection [C]//Proc of the North American Fuzzy Information Soeiety, Annual Meeting of the North American ( NAFIPS-FLINT 2002 ). New Orleans: IEEE Press, 2002: 161-168. 被引量:1
  • 8Song D, Heywood M I, Zincir-Heywood A N. A linear genetic programming approach tO intrusion detection[C]///Proc of Genetic and Evolutionary Computation Conference (GECCO 2003 ). Berlin: Springer Verlag, 2003: 2 325-2 336. 被引量:1
  • 9Ferreira C. Gene expression programming: mathematical modeling by an artificial intelligence [ M]. Berlin: Springer-Verlag, 2006. 被引量:1
  • 10Zhou C, Xiao W, Tirpak T M. Evolving accurate and compact classification rules with gene expression programming[J]. IEEE Transactions on Evolutionary Computation, 2003, 7(6): 519-531. 被引量:1

共引文献23

同被引文献52

引证文献6

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部