期刊文献+

一种基于冲突检测的无关联规则集匹配算法 被引量:7

An Irrelative Rule Set Match Algorithm Based on Collision Detection
在线阅读 下载PDF
导出
摘要 防火墙已经成为网络安全体系中一个关键的角色,对防火墙的管理越来越受到重视。本文针对在防火墙管理中容易出现的过滤规则冲突问题和规则匹配效率问题,提出了一种基于冲突检测的无关联规则集匹配算法。本文通过对规则进行分析,确定了规则库中的规则应该符合的五个关系;通过对冲突规则的分类,得到了按照各种冲突的特性进行冲突检测产生的状态图,有助于对防火墙的现有规则库进行重写优化。本文在分析传统的线性顺序规则匹配算法和树形规则匹配算法的基础上,提出一种基于冲突检测的无关联规则集匹配算法,其平均比较次数为O(lg(n)),性能上大大优于现有的算法。 The fire wall has already become a key role in the network security architecture,and more and more attention has been paid to the management of firewalls. This paper aims at the problems of rule collision and rule match efficiency in the management of firewalls,and submits an irrelevant rule set match algorithm based on collision detection. By analyzing the filtering rules,the paper confirms 5 relations that the rules should be matched;by categorizing the collision rules,the paper concludes the collision detection state diagram according to the collision's characteristics,which helps to optimize the firewall rule set. Based on the analysis of the traditional liner match algorithm and the tree match algorithm,the paper submits an irrelative rule set match algorithm based on collision detection.The efficiency of the algorithm is O(log(n)) on the average and the performance of the algorithm is better than the traditional ones.
出处 《计算机工程与科学》 CSCD 北大核心 2010年第10期1-4,19,共5页 Computer Engineering & Science
关键词 防火墙 规则集 冲突检测 无关联 firewall rule set collision detection irrelative
  • 相关文献

参考文献8

二级参考文献20

  • 1Zalenski R.Firewall technologies[J].IEEE,2002:21.
  • 2Thomas H Cormen et al.Introduction to algorithms[M].MIT Press,2001.
  • 3Bryant R E.Graph-Based Algorithms for Boolean Function Manipulation[J].IEEE Transactions on Computers,1986,8(C-35):677-691.
  • 4Bryant R E.Symbolic Boolean Manipulation with Ordered Binary Decision Diagrams (CMU-CS-92-160) [R].Carnegie Mellon:School of Computer Science,Carnegie Mellon University,1992.
  • 5B Hari,S Suri,G Parulkar.Detecting and Resolving Packet Filter Conflicts[C].In:Proceedings of IEEE INFOCOM'00,2000
  • 6A Mayer,A Wool,E Ziskind.Fang:A Firewall Analysis Engine[C].In:Proceedings of the 2000 IEEE Symposium on Security and Privacy,2000
  • 7Y Permpoontanalarp,C Rujimethabhas.A Unified Methodology for Verification and Synthesis of Firewall Configurations[C].In:ICICS 2001,LNCS 2229,Springer-Verlag Berlin Heidelberg,2001:328~339
  • 8J D Guttman.Filtering Postures:Local Enforcement for Global Policies[C].In:Proc IEEE Symp on Security and Privacy,Oakland,CA,1997
  • 9R Panko.Corporate Computer and Network Security[M].Prentice Hall,2003
  • 10A Rubin,D Geer,M Ranum.Web Security Source book[M].Wilsy Computer Publishing,1997

共引文献16

同被引文献62

引证文献7

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部