Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Shenyang College of Education》 2003-03
Add to Favorite Get Latest Update

Accurate validate about the firewall's pack filtering rule

WANG Xiao-wei~1,LI Feng~2(1.Shenyang Normal University,Shenyang 110034)(2.The High Way Administration Bureau of Laoning Province,Shenyang 110011,China)  
With the quick development of network technology, it is necessary for us to learn and work in web application and share network resources. As long as there is network, safety problem will become very important and dangerous.Now, there are all kinds of safety tools in the market, but the firewalls is the mature technology and is the earliest manufacture. The firewall is a technique of strategy safety to realize. Packet filtering system of the firewalls is the most basic, the most important, most the kernel. The packet filter rule of the firewalls is based on actual safe policy, and should think over the whole validation and criterion about rule aggregate, not centralize in every rule of rule aggregate. This paper validates the correctness of packet filtering rules, tests rules conflict before rules were applied, avoid contradiction and redundancy between rules, so it is convenient to manage rules, maintain rules, and will make better safe policy.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 ZHANG Dei ming (Department of Postgraduate Education,Chongqing University of Posts and Telecommunication,Chongqing 400065);Internet Security —— Packet Filter and Firewall[J];Journal of Chongqing University of Posts and Telecommunications;1999-04
Chinese Journal Full-text Database 10 Hits
1 Cheng Wei (Beijing Polytechnic College,Beijing 100042,China);Research of Electric Power System Safety[J];Journal of Beijing Polytechnic College;2008-03
2 FU Xiao-xiao,WANG Shi-min(College of Computer Science and Technology,Beijing Technology and Business University,Beijing 100037,China);POKER GAME BASED ON RSA ENCRYPT ARITHMETIC[J];Journal of Beijing Technology and Business University(Natural Science Edition);2007-05
3 ZHANG Dei ming (Department of Postgraduate Education,Chongqing University of Posts and Telecommunication,Chongqing 400065);Internet Security —— Packet Filter and Firewall[J];Journal of Chongqing University of Posts and Telecommunications;1999-04
4 LU Si-jun,ZHU Hong,LI Xu-wei(College of Computers, SCU, Chengdu 610064, China);Application of deep packet inspection technology to firewall[J];Journal of Chengdu University of Information Technology;2005-01
5 YU Xiu xia (Modern Education Technology Centre,Changchun University,Changchun?130022,China);Analysis of public-key encryption numeration[J];Journal of Changchun University;2002-01
6 YE Ji?xiang1, HU Xiao?bing2 (1.Dept. of Computer Eng., Changsha Communication Univ., Changsha 410076, China;2.Dept. of Education,Changsha Univ.of Electr. Power, Changsha 410077,China);Design of Enterprise Network Based on Secure Strategy[J];Journal of Changsha University of Electric Power(Natural Science);2001-01
7 LIU Xiang-hua (Dept. of Math. & Computer,Changsha Univ. of Electr. Power,Changsha 410077,China);Encrypt Arithmetic of Symmetry[J];Journal of Changsha University of Electric Power(Natural Science);2002-04
8 LIU Xiao hong (The 613th Research Institute of AVIC, Luoyang 471009);Virus Defense Technology for Avionics[J];Electronics Optics & Control;2001-03
9 Chen Wei1,Wang Qiong 2(1.Central South University;2.Hunan school of communications);THE INFORMATION SECURITY ON THE INTERNET AND FIREWALL[J];Journal of Dongguan Institute of Technology;2002-01
10 GAO Shu feng (Dept. of Econ. and Trad., Dalian Inst. of Light Ind., Dalian 116034, China);The Application of Firewall in Intranet[J];JOURNAL OF DALIAN INSTITUTE OF LIGHT INOUSTRY;1999-03
Chinese Journal Full-text Database 10 Hits
1 GAO Ze-sheng,TAO Hong-cai (School of Computer and Comm. Engineering, SWJTU, Chengdu 610031,China);Research and implementation of personal firewall based on NDIS-HOOK[J];Journal of Chengdu University of Information Technology;2004-03
2 WAN Guo-gen,QIN Zhi-guang (School of Computer Science and Engineering, UEST of China Chengdu 610054);Improved AC-BM Algorithm for Matching Multiple Strings[J];Journal of University of Electronic Science and Technology of China;2006-04
3 TIAN Li-Qin, and LIN Chuang (Department of Computer Science and Technology, Tsinghua University, Beijing 100084);Study and Application of Packet Classification[J];Journal of Computer Research and Development;2003-06
4 Li Yun Li Weihua(Department of Computer Science and Engineering,Northwestern Polytechnical University,Xi'an710072);Research with Pattern Matching Algorithms for Intrusion Detection[J];Computer Engineering and Applications;2003-06
5 Dong Jianan 1,2 Wang Yonggang 2 Wu Qiufeng 11 (Automation Department ,Tsinghua University,Beijing100084) 2 (Institute of Science and Technology Information of Liaoning Province,Shen yang110015);Research and Implementation of the Iptables Firewall[J];Computer Engineering and Applications;2003-17
6 Zheng Weibin Zhang Deyun Li Shenglei(Xi'an Jiaotong University,School of Electronics and Informantion Engineering,Xi'an710049);Dynamic Access Control Mechanism for Firewalls[J];Computer Engineering and Applications;2003-32
7 YANG Wu1,FANG Binxing2,YUN Xiaochun1,ZHANG Hongli1 (1. School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001; 2. National Computer Network and Information System Security Administration Center, Beijing 100031);Study of Efficient Pattern Matching Algorithms in Intrusion Detection System[J];Computer Engineering;2004-13
8 GUO Xingyang, GAO Feng, TANG Chaojing(College of Electronic and Engineering, National Univ. of Defense Technology, Changsha 410073);A Method for Packet Filtering in NDIS Intermediate Driver[J];Computer Engineering;2004-17
9 LI Xueying1,2,LIU Baoxu2,XU Rongsheng2 (1.Network Information Center, Institute of Medical Information, Academy of Military Medical Sciences ,Beijing 100850; 2.Computing Center, Institute of High Energy Physics, CAS, Beijing 100039);Research of String Matching Techniques[J];Computer Engineering;2004-22
10 TAN Hansong,PENG Shili(College of Information Science & Engineering,Central South University,Changsha 410083);A New Fast Algorithm for Matching Multiple Patterns[J];Computer Engineering;2005-18
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved