期刊文献+

基于日志挖掘的防火墙安全测评方法

Method of firewall security evaluation based on log mining
下载PDF
导出
摘要 针对当前防火墙存在的安全问题,分析并比较现有防火墙安全测评方法,提出了一种基于日志挖掘的防火墙安全测评方法。基于现有标准和实际安全需求,提取防火墙安全测评指标体系,并采用相应的日志挖掘算法,发掘出关联数据,再利用测评分析算法,分析防火墙的安全策略是否符合相应指标要求,为其安全整改提供参考建议。该方法借鉴了数据挖掘的思想,审计日志分析也能够真实反映防火墙的安全问题,同时通过改造决策树算法,优化了安全测评的效率。实验结果表明,提出的测评方法能够有效分析防火墙的配置策略问题。 To detect and solve security problems of the firewalls, several existing methods of security evaluation on firewall are compared and a new way based on its audit log is proposed, which uses the idea of data mining. Firstly, the firewall evaluation index system is generated from the related standards and the security requirements. Secondly, log mining algorithms are used for extracting associated information. Then, the mined information is imported into the corresponding evaluation algorithms for analyzing and the results can help strengthen the firewall security. This method use the idea of data mining and the evaluation results could reflect the firewall problems veritably. It also optimizes some algorithms to enhance the efficiency. Finally, experiments show that the proposed method analyzes the security problems of the online firewalls effectively.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第1期66-73,共8页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2009AA01Z439) 国家高技术产业化项目信息安全专项基金项目 信息网络安全公安部重点实验室开放基金项目(C10606)
关键词 审计日志 数据挖掘 规则匹配 决策树 测评指标体系 安全测评 audit log; data mining; rules matching; decision tree; evaluation index system; security evaluation
  • 相关文献

参考文献15

  • 1荀宝铖,罗军勇.一种分布式防火墙过滤策略的异常检测模型[J].计算机工程与设计,2006,27(22):4201-4203. 被引量:3
  • 2A1-Shaer E, E1-Atawy A, Samak T. Automated pseudo-live testing of firewall configuration enforcement [J]. Network In- frastructureConfiguration, 2009, 27 (3):302-314. 被引量:1
  • 3Senn D, Basin D, Caronni G. Firewall conformance testing [C]. TestCom, 2005: 226-241. 被引量:1
  • 4Kiesel S, Scharf M. Modeling and performance evaluation of transport protocols for firewall control [J]. Computer Net- work, 2007, 51 (11): 3232-3251. 被引量:1
  • 5Brucker A D, Brtigger L, Kearney P, et al. Verified firewall policy transformations for test case generation [C]. Third In- ternational Conference on Software Testing, Verification and Validation, 2010: 345-354. 被引量:1
  • 6Tuglular T, Kaya O, Muftuoglu A, et al. Directed acyclic graph modeling of security policies for firewall testing [C]. Proceedings of SSIRI, 2009: 393-398. 被引量:1
  • 7Alex X L. Firewall policy verification and trouble shooting [J]. Computer Networks, 2009, 53 (16): 2800-2809. 被引量:1
  • 8Winding R, Wright T, Chapple M. System anomaly detec- tion., mining firewall logs[C]. Proceedings of the Securecomm and Workshops. IEEE Computer Society, 2006 : 1-5. 被引量:1
  • 9Stanford P J, Parish D J, Stanford J M. Detecting security threats in the network core using data mining techniques [C]. Network Operations and Management Symposium, 2006: 1-4. 被引量:1
  • 10Golnabi K, Min R K, Khan L, et al. Analysis of firewall policy rules using data mining techniques [C]. Proceedings of the 10th IEEE/IFIP Symposium on Network Operation and Management, 2006: 305-315. 被引量:1

二级参考文献14

  • 1Bellovin S M.Distributed firewalls[C].Login:Magazine,Special Issue on Security,1999.37-39. 被引量:1
  • 2Robert Stepanek.Distribute firewall[C].Seminar on Network,Security Telecommunications Software and Multimedia Laboratory,2001. 被引量:1
  • 3Woo T.A modular approach to packet classification:Algorithms and results[C].Proceedings of IEEE INFOCOM'00,2000. 被引量:1
  • 4Cobb S.ICSA firewall policy guide v2.0[M].NCSA Security White Paper Series,1997. 被引量:1
  • 5Hazelhusrt S.Algorithms for analyzing firewall and router access lists[R].South Africa:Technical Report TRWitsCS-1999,Department of Computer Science,University of theWitwatersrand,1999. 被引量:1
  • 6Fu Z,Wu F,Huang H,et al.IPSec/VPN security policy:Correctness,conflict detection and resolution[C].Proceedings of Policy 2001 Workshop,2001. 被引量:1
  • 7Al-Shaer E,Hamed H.Design and implementation of firewall policy advisor tools[R].TechnicalReport CTI-techrep0801,School of Computer Science Telecommunications and Information Systems,DePaul University,2002. 被引量:1
  • 8Al-Shaer E,Hamed H.Firewall policy advisor for anomaly detection and rule editing[C].IEEE/IFIP Integrated Management IM,2003. 被引量:1
  • 9Al-Shaer E,Hamed H.Management and translation of filtering security policies[C].IEEE International Conference on Communications,2003. 被引量:1
  • 10Hari B,Suri S,Parulkar G.Detecting and resolving packet filter conflicts[C].Proceedings of IEEE INFOCOM'00,2000. 被引量:1

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部