期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
基于Cisco路由器的防火墙技术
1
作者 李小明 梅晟 《通信世界》 1999年第11期49-52,共4页
网络安全问题不容忽视。其主要的解决方法是配置网络防火墙。本文较详细地介绍了基于Cisco路由器的包过滤防火墙技术及其实现步骤。
关键词 防火墙 过滤路由器 访问列表
在线阅读 下载PDF
浅析防火墙在网络安全中的作用
2
作者 王岩 《吉林建筑工程学院学报》 CAS 2011年第5期67-69,共3页
21世纪全世界的计算机都将通过Internet联到一起,信息安全的内涵也就发生了根本的变化.它不仅从一般性的防卫变成了一种非常普通的防范,而且还从一种专门的领域变成了无处不在的网络安全技术.本文对防火墙安全技术的分类及其主要技术特... 21世纪全世界的计算机都将通过Internet联到一起,信息安全的内涵也就发生了根本的变化.它不仅从一般性的防卫变成了一种非常普通的防范,而且还从一种专门的领域变成了无处不在的网络安全技术.本文对防火墙安全技术的分类及其主要技术特征进行了比较详细的论述. 展开更多
关键词 网络安全 防火墙技术特征 过滤路由器 应用层网关
在线阅读 下载PDF
Intranet防火墙和安全 被引量:1
3
作者 范宏伟 须德 《铁路计算机应用》 1998年第5期32-35,共4页
作者在文中阐述了Intranet防火墙系统及安全策略,重点论述了构建Intranet防火墙时所涉及的各种问题并给出防火墙系统拓扑结构和设计实例。
关键词 防火墙 安全策略 过滤路由器 应用层网关 堡垒主机
全文增补中
分布式防火墙
4
作者 CyndiMills 《中国数据通信》 2001年第10期67-71,共5页
关键词 分布式防火墙 过滤路由器 网络安全 INTERNET 企业网 计算机网络
在线阅读 下载PDF
一种新的网络拓扑发现解决方案 被引量:1
5
作者 黄燕辉 刘云 张振江 《铁路计算机应用》 2010年第8期10-13,共4页
通过研究网络拓扑发现算法,描述了多址路由器和匿名路由器多拓扑发现造成的影响。改进了路由器别名判定法和匿名路由器处理方法,提出邻居-子网综合法和最大匿名综合法。改进后的算法能准确的发现真实网络拓扑,通过实验表明,该算法能够... 通过研究网络拓扑发现算法,描述了多址路由器和匿名路由器多拓扑发现造成的影响。改进了路由器别名判定法和匿名路由器处理方法,提出邻居-子网综合法和最大匿名综合法。改进后的算法能准确的发现真实网络拓扑,通过实验表明,该算法能够有效地克服多址路由器和匿名路由器对拓扑发现造成的影响,提高拓扑发现效率与准确性。 展开更多
关键词 拓扑发现 路由器别名过滤 跟踪路由 匿名路由器
在线阅读 下载PDF
SAFE:a Scalable Filter-Based Packet Filtering Scheme 被引量:1
6
作者 LU Ning HU Wenhao 《China Communications》 SCIE CSCD 2016年第2期163-177,共15页
Recently, attacks have become Denial-of-Service (DOS) the mainstream threat to the internet service availability. The filter-based packet filtering is a key technology to defend against such attacks. Relying on the ... Recently, attacks have become Denial-of-Service (DOS) the mainstream threat to the internet service availability. The filter-based packet filtering is a key technology to defend against such attacks. Relying on the filtering location, the proposed schemes can be grouped into Victim-end Filtering and Source-end Filtering. The first scheme uses a single filtering router to block the attack flows near the victim, but does not take the factor that the filters are scarce resource into account, which causes the huge loss of legitimate flows; considering each router could contribute a few filters, the other extreme scheme pushes the filtering location back into each attack source so as to obtain ample filters, but this may incur the severe network transmission delay due to the abused filtering routers. Therefore, in this paper, we propose a scalable filter-based packet filtering scheme to balance the number of filtering routers and the available filters. Through emulating DoS scenarios based on the synthetic and real-world Intemet topologies and further implementing the various filter-based packet filtering schemes on them, the results show that our scheme just uses fewer filtering routers to cut off all attack flows while minimizing the loss of legitimate flows. 展开更多
关键词 internet security DoS attacks filtering scheme
在线阅读 下载PDF
A Router Based Packet Filtering Scheme for Defending Against DoS Attacks 被引量:1
7
作者 LU Ning SU Sen +1 位作者 JING Maohua HAN Jian 《China Communications》 SCIE CSCD 2014年第10期136-146,共11页
The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end ... The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end filtering and source-end filtering. The first scheme prevents attack traffic from reaching the victim, but causes the huge loss of legitimate flows due to the scarce filters (termed as collateral damages); the other extreme scheme can obtain the sufficient filters, but severely degrades the network transmission performance due to the abused filtering routers. In this paper, we propose a router based packet filtering scheme, which provides relatively more filters while reducing the quantity of filtering touters. We implement this scheme on the emulated DoS scenarios based on the synthetic and real-world Internet topologies. Our evaluation results show that compared to the previous work, our scheme just uses 20% of its filtering routers, but only increasing less than 15 percent of its collateral damage. 展开更多
关键词 Internet security DoS attacks filter-based reactive packet filtering
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部