首页 | 本学科首页   官方微博 | 高级检索  
     

防火墙规则间包含关系的解析方法
引用本文:殷奕,汪芸.防火墙规则间包含关系的解析方法[J].计算机应用,2015,35(11):3083-3086.
作者姓名:殷奕  汪芸
作者单位:1. 东南大学 计算机科学与工程学院, 南京 211189;2. 南京师范大学 计算机科学与技术学院, 南京 210023
基金项目:国家自然科学基金资助项目(60973122);国家973计划项目.
摘    要:针对防火墙规则集中规则间的相互关系难以把握,从而导致防火墙无法正确地过滤数据包的问题,提出了一种基于集合理论的规则间包含关系的解析方法.该方法在不考虑规则动作的情况下,基于集合理论的包含关系来解析和分类规则之间的关系,简化了分析规则间相互关系的过程.并且使用高效的函数式编程语言Haskell实现了所提出的方法,整体代码简洁、易于维护和扩展.实验结果表明,对于中小规模的防火墙规则集,能够快速而有效地解析规则间的包含关系,并且能够为后续的规则间的异常检测提供重要的依据.

关 键 词:网络安全  防火墙  规则集  函数式编程语言  集合理论  
收稿时间:2015-06-17
修稿时间:2015-07-28

Analysis method of inclusion relations between firewall rules
YIN Yi,WANG Yun.Analysis method of inclusion relations between firewall rules[J].journal of Computer Applications,2015,35(11):3083-3086.
Authors:YIN Yi  WANG Yun
Affiliation:1. School of Computer Science and Engineering, Southeast University, Nanjing Jiangsu 211189, China;2. School of Computer Science and Technology, Nanjing Normal University, Nanjing Jiangsu 210023, China
Abstract:It is difficult to understand all the relations between firewall rules. Poorly-organized rules may cause the problem that firewall could not filter packets correctly. In order to solve this problem, an analysis method of inclusion relations between firewall rules based on set theory was proposed. Based on the inclusion relations in set theory, the proposed method analyzed and classified the relations between firewall rules without considering the actions of rules. The proposed method simplified the process of analysis relations between firewall rules, and it was implemented by using a functional programming language, Haskell. The whole Haskell codes were concise, which also were easy to maintain and expand. The experimental results show that, with regard to medium scale sets of rules, the proposed method can analyze the inclusion relations between firewall rules rapidly and effectively. The proposed method also provides an important basis for the succeeding rules conflict detection.
Keywords:network security                                                                                                                        firewall                                                                                                                        rules set                                                                                                                        functional programming language                                                                                                                        set theory
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号