期刊文献+

基于免疫的防火墙系统安全技术研究 被引量:7

Research of Immune- Based Technology for the Firewall System Security
在线阅读 下载PDF
导出
摘要 针对各种网络攻击技术,特别是对防火墙的攻击技术进行了系统的研究,在分析典型的网络攻击技术的基础上,提出了一个防火墙安全技术模型:基于免疫的防火墙系统安全模型和基于协议的防火墙安全策略模型,并详细介绍了采用的安全策略。 This paper has analysed the various kinds of network attack techniques, especially those that aim at the Firewall. And through the research results about network attacks technique, concludes a practical model of Firewall Security Technique. ineluding Firewall System Securitv Model and Firewall Security Policy Model.Besides that.has describled the security policy in details.
出处 《微计算机信息》 北大核心 2005年第09X期16-18,共3页 Control & Automation
基金 河南省自然科学基金资助项目编号:2004ABB049
关键词 免疫 防火墙 系统安全 安全策略 模型 Immune Firewall System Security Security Policy Model
  • 相关文献

参考文献3

二级参考文献7

  • 1Guido Van Rooij.Real Stateful TCP Packet Filtering in IP Filter[EB/OL].http://citeseer.nj.nec.com/correct/491783.
  • 2Richard Stiennon.Deep Packet Inspection:Next Phase of Firewall Evolution[EB/OL].http://www.gartner.com/DisplayDocument?doccd=111579.
  • 3DouglasEComer 林瑶.用TCP/IP进行网际互连[M].北京:电子工业出版社,2001..
  • 4曹斌.网络防火墙的体系结构[EB/OL].http://neteye.neusoft.com/Docs/News/html/20010913112353854/htmlfile/200109131123 53854.html.,.
  • 5费宗莲.防火墙倾向内容过滤[EB/OL].http://media.ccidnet.com/media/ciw/1169/c2301.html.,.
  • 6.流过滤技术分析[EB/OL].http://neteye.neusoft.com/Docs/News/html/20011212131209304/htmlfile/2001121213 1209304.html.,.
  • 7梁意文,李俊涛,郭学理,康立山.一种基于用户行为的Self集构造和演化方法[J].计算机应用研究,2001,18(9):7-9. 被引量:11

共引文献23

同被引文献24

  • 1谈永新,黄锡鹏.一种新的快速自适应车牌定位方法[J].微计算机信息,2005,21(2):66-68. 被引量:14
  • 2P. Matzinger. An innate sense of danger. Seminars in Immunology, 10:399-415, 1998.
  • 3S. Forrest, A,S. Perelson, L. Allen, R. and Cherukuri. Self-Nonself Discrimination in a Computer. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA: IEEE Computer Society Press (1994).
  • 4L. N. de Castro and F. J. V. Zuben. The clone selection algorithm with engineering applications. In Proceedings of GECCO'00, Workshop on Artificial Immune Systems and Their Applications, pp. 36-37. 2000.
  • 5Kim, J. and Bentley, P. (1999b). The Artificial Immune Model for Network Intrusion Detection. 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT'99), Aachen, Germany.
  • 6S. Hofmeyr and S. Forrest. Architecture for an Artificial Immune System. Evolutionary Computation 7 (1), Morgan-Kaufmann, San Francisco, CA, pp. 1289-1296 (2000).
  • 7http://esa.ackleyshack.com/ndb/
  • 8C. Perkins. IP Mobility Support, RFC 2002, October 1996.
  • 9S.Kent.Security Architecture for the Intemet Protocol,RFC2401,November 1998.
  • 10Stefan Mink. Towards Secure Mobility Support for IP Networks.Communication Technology Proceedings, 2000.

引证文献7

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部