期刊文献+

基于进程防火墙与虚拟盘的非法信息流过滤方法 被引量:5

A model of illegal information flow filtering based on process firewall and virtual disk technology
在线阅读 下载PDF
导出
摘要 提出一种在虚拟磁盘中对文件映像前后的访问进程进行监控并对非法信息流进行过滤的方法。该方法在关键字或特征信息提取过程中安装各种钩子并对接入主机进行审计,用来提高系统服务器的包转发速率与非法信息的捕捉能力。其目的是阻止病毒或木马程序对文件破坏或数据包劫持,保证信息接入的可控性和安全性。实验测试表明,系统降低了包转发时延,提高了包转发速率和非法信息的识别能力。 The paper presents a method that monitors the access process of the virtual disk file image before and after and using illegal information flow filter drivers. There install a lot of host audit hooks on host audit system during the extraction of the keywords or characteristic information, in order to improve the packet forwarding rate of the server and the capturing ability of ille- gal information. Its purpose is to prevent document from destruction by virus or Trojan program, and achieve controllability and safe- ty in information access. Finally, we perform an experiment through IxLoad. The results of the experiment show that the system can reduce the packet forward delay, improve the packet forwarding rate and better the recognizing ability of illegal information.
出处 《微型机与应用》 2013年第20期51-53,56,共4页 Microcomputer & Its Applications
基金 国家自然科学基金资助项目(51074097)
关键词 网络信息安全 进程防火墙 虚拟磁盘技术 非法信息流 内核钩子 过滤代价 network information security process firewa11 virtual disk technology illegal information flow kernel hooks filtering cost
  • 相关文献

参考文献7

二级参考文献35

  • 1MingxingLi PingHeng PeiwuDong.Research on Artificial Neural Network Method for Credit Application[J].Journal of Systems Science and Information,2004,2(1):127-131. 被引量:3
  • 2张新跃,沈树群.基于策略的网络安全资源管理系统设计与实现[J].数据通信,2004(3):16-19. 被引量:3
  • 3冯涛,张玉清,高有行.网络安全事件应急响应联动系统模型[J].计算机工程,2004,30(13):101-103. 被引量:17
  • 4George Louthan, Brady Deetz,Matthew Walker. Content-based alternatives to conventional network monitoring systems [J]. CSIIRW,2009(4): 13-15.
  • 5Sarang Dharmapurikar, John Lockwood.Fast and scalable pattem matching for content filtering[J].ANCS,2005(8):26-28.
  • 6党宇.基于Linux系统的关键字过滤防火墙研究与实现[D].成都:电子科技大学学位论文,2006.
  • 7董振东,董强.http://www.keenage.com/e_zhiwang.html[EB/OL].2010.
  • 8Yuan L H,Mai J N,Su Z D.Fireman:A toolkit for firewall modeling and analysis[C]//Procedings of the 2006 IEEE Symposium on Security and Privacy,Berkeley,California,USA,2006,15.
  • 9Verdiekt T,Meerssche W V D,Vlaeminck K.Modeling the performance of a NAT/firewall network service for the IXP2400[C]//Proceedings of the 5th International Workshop on Software and Performance,Palma,Balearic,Spain,2005:137-144.
  • 10Claffy K,Miller G,Thompson K.The nature of the beast:Recent traffic measurements from an Intomet backbone[EB/OL].(1998-02-03).http://www.caida.org/publications/papers/1998/Inet98/Inet98.html.

共引文献18

同被引文献84

  • 1吴麒,刘毅,陈兴蜀,王文贤,郑炳伦.eDonkey的网络爬行技术及特性分析[J].计算机应用研究,2009,26(3):1047-1049. 被引量:1
  • 2HAGANMT,DEMUTHHB,BEALEM.神经网络设计[M].戴葵,宋辉,谭明峰,等,译.北京:机械工业出版社,2003.
  • 3SimonHaykin.神经网络与机器学习[M].申富饶,徐烨,译.北京:机械工业出版社,2011:269-295.
  • 4陆佳华,杨卫,周剑,等.零存整取NetFPGA开发指南[M].北京北京航空航天大学出版社,2010.
  • 5北京理工大学.NETFPGA用户手册[R],2009.
  • 6网穆成坡.网络入侵分析与入侵响应[M].北京:北京理工大学出版社,2011.
  • 7Russinovich MR, Solomon DA. Microsoft windows Internals:WindowsServer 2008 and Windows Vista[M]. 5th ed. USA: Microsoft Press,2012.246-266.
  • 8ITU—T Rec.H.263/Appendix 111(06/2001), H.263 : Video coding forlow bit rate communication[S].
  • 9H.323: Packet—based multimedia communications systems[S]. 1998,2.
  • 10WIEGAND T, SULLIVAN G T,BJONTEGAARD G, et al.Overview of the H.264/AVC Video Coding Standard[J]. IEEETransactions on Circuits and Systems for Video Technology, 2003,13(07):1-19..

引证文献5

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部