基于防火墻的訪問(wèn)控制列表的研究與優(yōu)化
[Abstract]:A firewall is a security guard between a private network and an external network entry point through which all incoming and outgoing packets must pass. It is the key system to protect most network security. An error in a firewall not only leaks secret information in the network, but also destroys legitimate communication between the network and other networks. Therefore, how to design the firewall correctly is an important problem. We know that most of the security policies in the network are implemented using the access control list (Access Control List, (ACL) to configure packet classification policies. At least thousands of rules need to be deployed by ACL to perform traffic filtering on a gateway device. Because of many difficulties in ACL configuration language, large-scale ACL rule sets are easy to become redundant, inconsistent, difficult to optimize or even difficult to understand. Firewall is the core element of network security. However, managing firewall rules has become complex and error-prone. In order to implement security policies correctly, firewall filtering rules must be carefully written and organized. In addition, inserting or modifying a filtering rule requires a thorough analysis of the relationship between this rule and other rules to determine the correct order of the rule and submit updates. In this paper, we propose a set of techniques and algorithms that provide (1) automatic anomaly detection to discover rule conflicts and potential problems in traditional firewalls, (2) rule insertion, modification and deletion of exception-free policy editing, (3) translate the filtering rules into high-level text descriptions for user visualization and validation. This is done in a user-friendly tool called Firewall Policy Advisor. Firewall Policy Advisor greatly simplifies the management of any common firewall policies written as filtering rules and minimizes network vulnerabilities due to misconfiguration of firewall rules. This paper also implements the ACL optimization method for conflict rules and redundant rules. The conflicts and redundancy problems in ACL rules are ignored in the existing construction algorithms of firewall policy graph (Firewall Decision Diagram, (FDD). On the basis of firewall policy graph, we study the algorithm of detecting conflicts and redundancy of ACL rules, and on this basis, we optimize the construction algorithm of firewall policy graph, and propose a new algorithm of firewall decision graph. By reducing redundancy and avoiding collision, the number of rules in access control list is greatly reduced, and the query performance is greatly improved. Experimental results show that our improved firewall decision graph algorithm is feasible and efficient.
【學(xué)位授予單位】:華中師范大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前5條
1 楊偉;;防火墻技術(shù)研究[J];科技信息;2013年18期
2 秦拯;歐露;張大方;Alex X.Liu;;高吞吐量協(xié)作防火墻的雙向去冗余方法[J];湖南大學(xué)學(xué)報(bào)(自然科學(xué)版);2013年01期
3 張昭理;洪帆;肖海軍;;一種防火墻規(guī)則沖突檢測(cè)算法[J];計(jì)算機(jī)工程與應(yīng)用;2007年15期
4 安智斌 ,鄭炎雄 ,向妮;在Lotus Notes中實(shí)現(xiàn)Internet安全性[J];湖北成人教育學(xué)院學(xué)報(bào);2001年06期
5 徐斌,徐悅;防火墻技術(shù)與Internet信息安全[J];現(xiàn)代電子技術(shù);2001年01期
相關(guān)碩士學(xué)位論文 前5條
1 劉振宇;基于令牌桶算法的網(wǎng)絡(luò)流量控制技術(shù)的研究與實(shí)現(xiàn)[D];內(nèi)蒙古大學(xué);2012年
2 劉博文;優(yōu)化防火墻過(guò)濾域排序的研究[D];中國(guó)科學(xué)技術(shù)大學(xué);2009年
3 丁健;基于Netfilter框架的Linux防火墻技術(shù)研究及應(yīng)用[D];武漢理工大學(xué);2009年
4 高志強(qiáng);下一代軟件防火墻研究與設(shè)計(jì)[D];華中科技大學(xué);2007年
5 杜雨;防火墻遠(yuǎn)程配置管理系統(tǒng)的設(shè)計(jì)與實(shí)現(xiàn)[D];四川大學(xué);2006年
,本文編號(hào):2455226
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2455226.html