期刊文献+

一种防火墙规则配置异常分析方法 被引量:3

Analysis Method of Firewall Rule Configuration Anomalies
在线阅读 下载PDF
导出
摘要 从集合角度描述防火墙过滤规则及规则之间存在的异常类型,给出规则间异常类型判定方法。指出直接使用判定方法分析防火墙规则集时所存在的问题,提出一种基于规则顺序敏感性的防火墙规则配置异常分析方法,得到等效的不相关规则集,实现过滤规则的改写。 According to set theory, the method specifies the firewall filtering rules and various types of anomaly among them, brings forward a judgment method of anomaly types, points out the problems in the process of judgment which works directly on firewall rules. On the basis of order-sensitive characteristic of firewall rule configuration, the method finds out the equivalent irrelevance-rule set and modifies the filtering rule.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第2期164-166,共3页 Computer Engineering
关键词 防火墙 过滤规则 异常 顺序敏感性 firewall filtering rule anomaly order-sensitive characteristic
  • 相关文献

参考文献5

  • 1Wool A. A Quantitative Study of Firewall Configuration Errors[C]// Proceedings of IEEE Computer. [S. l.]: IEEE Press, 2004.
  • 2Gouda M, Liu Xiangyang. Firewall Design: Consistency, Completeness, and Compactness[C]//Proceedings of the 24th IEEE International Conference on Distributed Computing Systems. [S. l.]: IEEE Press, 2004-03.
  • 3Al-Shaer E, Hamed H. Management and Translation of Filtering Security Policies[C]//Proceedings of IEEE International Conference on Communications. [S. l.]: IEEE Press, 2003-05: 256-260.
  • 4Al-Shaer E, Hamed H. Firewall Policy Advisor for Anomaly Detection and Rule Editing[C]//Proceedings of IEEE/IFIP Integrated Management. [S. l.]: IEEE Press, 2003: 17-30.
  • 5Al-Shaer E, Hamed H. Design and Implementation of Firewall Policy Advisor Tools[R]. School of Computer Science Telecommunications and Information Systems, DePaul University, Technical Rept.: CTI-techrep0801, 2002-08.

同被引文献20

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部