Gao Yifei, Zhou Zhenggan, He Fangchenget al. Homogeneity testing of aluminum metal matrix composites by TIRP method[J]. Journal of Beijing University of Aeronautics and Astronautics, 2009, 35(8): 1031-1034. (in Chinese)
Citation: Huang Xin, Yin Baolin. Multi-level and multi-policy model of distributed network information filtering system[J]. Journal of Beijing University of Aeronautics and Astronautics, 2003, 29(10): 919-922. (in Chinese)

Multi-level and multi-policy model of distributed network information filtering system

  • Received Date: 05 Jun 2003
  • Publish Date: 31 Oct 2003
  • On the basis of analyzing the current network information filtering technologies, a scalable multi-level and multi-policy model of a distributed network information filtering system was described, which combines the functions of the packet analyzing, filtering and forwarding. A fine-granularity information filtering policy was provided, which effectively enhances the information security, increases the speed of data transfer, and decreases the latency. The filtering plug-ins can be conveniently configured and loaded. The model is scalable and open in architecture that can be easily configured and organized in order to meet a variety of requirements and run on the distributed system for gaining better performances. The information processing is transparent to the client hosts and applications so that the side effects to the users are minimal.

     

  • [1] 辛 涛, 周明天. 混合型防火墙的设计与实现[J]. 计算机研究与发展, 1998, 35(10):882~885 Xin Tao, Zhou Mingtian. Design and implementation of a hybrid fire-wall system[J]. Compute Research & Development, 1998, 35(10):882~885(in Chinese) [2] Younglove R. Virtual private networks——how they work[J]. Computing & Control Engineering Journal, 2000, 11(11):260~266 [3] 马太恒, 姜建春, 陈伟锋,等. 基于Agent的分布式入侵监测系统模型[J]. 软件学报, 2000, 11(10):1312~1319 Ma Taiheng, Jiang Jianchun, Chen Weifeng,et al. Distributed model of intrusion detection system based on agent[J]. Journal of Software, 2000, 11(10):1312~1319(in Chinese) [4] Lerida J L, Grackzy S M, Vina A. Detecting security vulnerabilities in remote TCP/IP networks:an approach using security scanners . Proceedings of IEEE 33rd Annual 1999 International Carnahan Conference . Madrid, 1999. 446~460 [5] Banisar D. Battle for control of encryption technology[J]. IEEE Software, 1993, 10(4):95~97
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2598) PDF downloads(6) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return