期刊文献+

NAT环境下基于兴趣关联规则的重定向技术 被引量:2

Redirect Technology Based on Interest Association Rules in NAT
在线阅读 下载PDF
导出
摘要 针对IP地址资源的匮乏和网络攻击手段的多样化,NAT环境下的网络安全性要求不断提高。文章研究了在NAT环境下的安全策略,并引入入侵重定向的概念。在Apriori算法挖掘的基础上,引入关联规则兴趣度,对入侵行为进行深度挖掘,将具有威胁的网络访问重定向到特定环境中,通过访问规则数据库与防火墙规则、IDS数据库的交互,提高了网络防御的主动性,与结合NAT的防火墙技术实现了对网络的双重保护。 For the lack of resources of IP address and diversification of network attack measures, the requirement of network security in NAT environment is raised continuously. This paper research on the security policy in NAT environment, and presents the concept of intrusion redirection. Based on Apriori algorithm mining, this paper proposes Interest degree of association rules, performs deep mining of intrusion behaviors, redirects the network access with threat into a specific environment, performs interaction with firewall rules and IDS database through accessing the rule database, improving the network defense initiative, and the firewall technology combined with NAT can implement duplex protection of the network as well.
出处 《计算机与数字工程》 2011年第7期113-116,共4页 Computer & Digital Engineering
基金 北京市教委科技项目(编号:KM200710011001)资助
关键词 NAT 入侵重定向 Apriori算法挖掘 关联兴趣规则 NAT intrusion redirection Apriori mining interest association rules
  • 相关文献

参考文献8

二级参考文献45

  • 1李小玲,周金治.网络地址转换技术在计算机网络上的应用[J].山东科技大学学报(自然科学版),2004,23(2):68-71. 被引量:8
  • 2Douglase E.Comer 林瑶等(译).用TCP/IP进行网际互连 第1卷:原理、协议和体系结构(第3版)[M].电子工业出版社,1999..
  • 3Willian R.Cheswick等 戴宗坤等(译).防火墙与因特网安全[M].机械工业出版社,2000..
  • 4W.Richard Stevens 任守奎等(译).TCP/IP详解 第1卷协议[M].北京大学出版社,1999..
  • 5SPITZNER L.Honeypots[EB/OL].http://www.tracking-hackers.com/papers/honeypots.html.
  • 6ZHOU Y L,ZHUGE G W,XU N,et al.Matrix,a distributed honeynet and its applications[C]// Proceedings of 20th Annual FIRST Conference (FIRST'08).[S.l.]:[s.n.],Jun 2008.
  • 7SPITZNER L.Honeypot Farms[EB/OL].http://www.securityfocus.com/infocus/1720.
  • 8HOSNER C.OpenVPN and the SSL VPN Revolution[EB/OL].http://www.sans.org/reading_room/whitepapers/vpns/1459.php.
  • 9The NoAH project[EB/OL].http://www.fp6-noah.org.
  • 10ANTONATOS S,MARKATOS E P,ANAGNOSTAKLS K G.Honey@home:A new approach to largescale threat monitoring[C]///Proceedings of the 2007 ACM Workshop on Recurring Malcode (WORM'07).Piscataway:IEEE,2007.

共引文献233

同被引文献16

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部