作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2009, Vol. 35 ›› Issue (2): 164-166. doi: 10.3969/j.issn.1000-3428.2009.02.058

• 安全技术 • 上一篇    下一篇

一种防火墙规则配置异常分析方法

孙 云,罗军勇,刘 炎   

  1. (解放军信息工程大学信息工程学院,郑州 450002)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2009-01-20 发布日期:2009-01-20

Analysis Method of Firewall Rule Configuration Anomalies

SUN Yun, LUO Jun-yong, LIU Yan   

  1. (College of Information Engineering, PLA Information Engineering University, Zhengzhou 450002)
  • Received:1900-01-01 Revised:1900-01-01 Online:2009-01-20 Published:2009-01-20

摘要: 从集合角度描述防火墙过滤规则及规则之间存在的异常类型,给出规则间异常类型判定方法。指出直接使用判定方法分析防火墙规则集时所存在的问题,提出一种基于规则顺序敏感性的防火墙规则配置异常分析方法,得到等效的不相关规则集,实现过滤规则的改写。

关键词: 防火墙, 过滤规则, 异常, 顺序敏感性

Abstract: According to set theory, the method specifies the firewall filtering rules and various types of anomaly among them, brings forward a judgment method of anomaly types, points out the problems in the process of judgment which works directly on firewall rules. On the basis of order-sensitive characteristic of firewall rule configuration, the method finds out the equivalent irrelevance-rule set and modifies the filtering rule.

Key words: firewall, filtering rule, anomaly, order-sensitive characteristic

中图分类号: