Multi-level and multi-policy model of distributed network information filtering system
-
摘要: 在分析现有网络信息过滤技术的基础上,描述了一种多层次、多策略、可扩展的分布式网络信息过滤系统模型框架.该模型框架包括网络信息数据分析、过滤及转发等功能,采用细粒度的内容过滤策略,在保证信息数据安全性的基础上,提高了数据转发的速度,缩短了数据传送的延时,并可以插件的形式灵活地挂载过滤程序,具有很好的开放性和可扩展性.该系统模型可以根据具体的需求,以模块的形式灵活地重组和配置各项功能,可在分布式环境下协同工作,提高了系统的性能.本系统的各种数据处理过程对用户是完全透明的,减少了对用户的影响.Abstract: On the basis of analyzing the current network information filtering technologies, a scalable multi-level and multi-policy model of a distributed network information filtering system was described, which combines the functions of the packet analyzing, filtering and forwarding. A fine-granularity information filtering policy was provided, which effectively enhances the information security, increases the speed of data transfer, and decreases the latency. The filtering plug-ins can be conveniently configured and loaded. The model is scalable and open in architecture that can be easily configured and organized in order to meet a variety of requirements and run on the distributed system for gaining better performances. The information processing is transparent to the client hosts and applications so that the side effects to the users are minimal.
-
[1] 辛 涛, 周明天. 混合型防火墙的设计与实现[J]. 计算机研究与发展, 1998, 35(10):882~885 Xin Tao, Zhou Mingtian. Design and implementation of a hybrid fire-wall system[J]. Compute Research & Development, 1998, 35(10):882~885(in Chinese) [2] Younglove R. Virtual private networks——how they work[J]. Computing & Control Engineering Journal, 2000, 11(11):260~266 [3] 马太恒, 姜建春, 陈伟锋,等. 基于Agent的分布式入侵监测系统模型[J]. 软件学报, 2000, 11(10):1312~1319 Ma Taiheng, Jiang Jianchun, Chen Weifeng,et al. Distributed model of intrusion detection system based on agent[J]. Journal of Software, 2000, 11(10):1312~1319(in Chinese) [4] Lerida J L, Grackzy S M, Vina A. Detecting security vulnerabilities in remote TCP/IP networks:an approach using security scanners . Proceedings of IEEE 33rd Annual 1999 International Carnahan Conference . Madrid, 1999. 446~460 [5] Banisar D. Battle for control of encryption technology[J]. IEEE Software, 1993, 10(4):95~97
点击查看大图
计量
- 文章访问数: 2531
- HTML全文浏览量: 86
- PDF下载量: 6
- 被引次数: 0