期刊文献+

一种基于HTTP包识别的网络安全设备联动的方法 被引量:3

A Method of Network Security Device Linkage Based on HTTP Packet Recognition
下载PDF
导出
摘要 本文通过在网络侧集线器与用户主机侧交换机之间部署安全联动设备防火墙,以及并联在集线器与交换机之间的审计系统,提出一种基于HTTP包识别的网络安全设备联动方法.它基于网络信息安全领域入侵检测与防范技术,用以在线解决现有网络安全设备联动阻断技术的时效性较差的问题.最后,通过实验测试证明该方法实用有效. The paper introduces a device linkage system on {irewall between the network side and the switch side of user host, and introduces the audit system connected in parallel between the hubs and switches. Then, the paper introduces a method based on HT'FP packet recognition network security device linkage, which is a technology of information security intrusion detection and prevention based on the network. It is mainly used to solve the existing network security equipment linkage blocking technology limitation poor problem. Finally, the test result shows that the method is practical and effective.
出处 《微电子学与计算机》 CSCD 北大核心 2013年第1期114-117,122,共5页 Microelectronics & Computer
基金 国家自然科学基金项目(60920109)
关键词 网络信息安全 设备联动 入侵检测 HTTP包识别 规则匹配 阻断处理 network information security device linkage intrusion detection HTTP packet recognition rule matching block processing
  • 相关文献

参考文献9

二级参考文献36

  • 1林昭文,王鲲鹏,马严.IPv6入侵检测系统性能优化的研究与实现[J].通信学报,2006,27(z1):68-71. 被引量:2
  • 2Vasiliadis G, Polychronakis M, Antonatos S, et al. Regular expression matching on graphics hardware for intrusion detection [C]// Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection. Saint-Malo, France: Springer-Verlag, 2009: 265- 283. 被引量:1
  • 3XIA Gao, LIU Bin. Accelerating network applications on X86-64 platforms [C]// Proceedings of IEEE Symposium on Computers and Communications. Riccione, Italy: IEEE Computer and Communications Societies, 2010 : 906 - 912. 被引量:1
  • 4Libpcap. Packet Capture Library [Z/OL]. [2010 09-251. http://www. tcpdump, org/. 被引量:1
  • 5WinPcap. The Packet Capture and Network Monitoring Library for Windows [Z/OL]. [2010-09-25]. http://www. winpcap, org/. 被引量:1
  • 6Libnids. An Implementation of an E-Component of Network Intrusion Detection System [Z/OL].[2010-09-25]. http: //libnids. sourceforge, net/. 被引量:1
  • 7Intel VTuneTM Performance Analyzer [Z/OL]. [2010-09 -25]. http://software. intel. com/en us/intel-vtune/. 被引量:1
  • 8Crosby S, Wallach D. Denial of service via algorithmic complexity attacks [C]// Proceedings of the 12th Conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2003. 被引量:1
  • 9Carter L, Wegman M. Universal classes of Hash functions (extended abstract) [C]// Proceedings of the Ninth Annual ACM Symposium on Theory of Computing. Boulder, CO, USA: ACM, 1977: 106-112. 被引量:1
  • 10Bloom B. Space/time trade-offs in Hash coding with allowable errors [J]. Communications of the ACM, 1970, 13(7) : 422 - 426. 被引量:1

共引文献27

同被引文献29

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部