分布式防火墙的设计与研究

VIP免费
3.0 朱铭铭 2024-09-24 7 4 811KB 38 页 150积分
侵权投诉
分布式防火墙的设计与研究
摘要
随着 Internet 的飞速发展,网络安全问题越来越受到人们的关注,防火墙已经成为网络
安全的重要产品,边界防火墙作为一种有效的网络安全技术,提供了对企业内部网络的
护,但在不断扩大的网络规模和日益多样化的网络技术面前,边界防火墙的缺陷也日益
出,它很难实现网络的安全性和网络性能之间的均衡。
为了克服传统防火墙的缺陷,而又保留其优点,人们提出了分布式防火墙的概念。分布
式防火墙的本质特征可概括为“策略集中制定分散实施,日志分散产生集中保存”。安
策略必须有管理员统一制定,策略必须被推到网络的边缘即主机上实施,日志必须统一
集、集中管理。
本文首先分析了目前传统防火墙的作用和存在的问题,接着对分布式防火墙的结构、
键技术以及优势进行了深入地研究,并对分布式防火墙的相关技术以及研究领域较有代
性的几种模型进行了比较总结。
其次,通过对防火墙策略的定义、实施和分发机制的研究,对分布式防火墙的策略管理
进行了探讨,并对策略执行器的功能、特点和相关技术做了系统的分析。再次,通过对策略
执行器的实施方案的比较,以及结构,处理流程和稳定性的分析并结合我国目前网络的
际状况,提出了一个分布式防火墙系统,给出了系统中包过滤模块的软件实现。
最后总结了全文并提出了一些值得研究的问题。
关键字:分布式防火墙,包过滤,策略执行器,NDIS
The Design and Research of the Distributed Firewall
Abstract
With the high-speed development of Internet, the problem of network security becomes more
and more important. The firewall has come to the most important security product, being as a kind
of effective network security technology, traditional perimeter firewall realizes the protection of
the inside network. But with the development of Internet, it is not adaptable to the Internet
application environment and is quite difficult to balance the security and network performance.
In order to overcome the defect of the traditional perimeter firewall and keep its advantage,
people have put forward the concept of the distributed firewall. The essential characteristic of the
distributed firewall can be summarized as “Making the strategy centralized and implementing it
distributed. Keeping the logs made dispersed”. The safety policy must be made by the
administrator and must be pushed to the hosts at the edge of the network. At the same time the
logs must be collected and centralized managed in unison.
First of all, this paper analyzes the effects and problems of the traditional perimeter firewall,
then lucubrates the structure, key technologies and advantages of the distributed firewalls and had
the representative to the distributed firewall related technology as well as the research area of
several models to carry on the comparison and summary.
Secondly, through to the firewall strategy definition, the implementation and the distribution
mechanism research, we carried on the discussion of the distributional firewall strategy
management, and made the system analysis of its strategy execution function, the characteristic
and the correlation technology.
And then, through to the strategy execution implementation plan comparison, as well as its
structure, the processing flow and the stable analysis combined with the network state of our
country, we produced the system with the packet-filtering module.
Finally summarized the full text and proposed some questions which are worth studied.
Keywords: DistributedFirewall, Packet-filtering, Rule Executer, NDIS
目录
1.绪论..................................................................1
11研究的意义........................................................1
12国内外研究现状.....................................................1
2.分布式防火墙技术基础..................................................4
2.1 防火墙概述..........................................................4
2.2 传统防火墙的体系结构和实现技术......................................5
2.2.1 防火墙的体系结构................................................5
2.2.2 防火墙实现技术..................................................6
2.2.3 防火墙的作用....................................................8
2.2.4 边界防火墙的局限性.............................................10
2.3 分布式防火墙的提出.................................................11
2.4 分布式防火墙性能分析...............................................12
2.5 分布式防火墙的基本原理.............................................14
2.6 分布式防火墙的体系结构及基本功能...................................15
2.6.1 分布式防火墙的体系结构.........................................15
2.6.2 分布式防火墙的功能.............................................17
2.7 分布式防火墙实现的关键技术.........................................18
2.8 分布式防火墙系统模型...............................................19
2.8.1 基于 OpenBSD UNIX 的实现.........................................19
2.8.2 基于网卡的实现.................................................20
2.8.3 基于 Agent 的分布式防火墙模型..................................22
2.8.4 基于 Ipsec 的分布式防火墙模型....................................24
2.8.5 基于 Kerberos 认证的分布式防火墙模型...........................25
2.8.6 混合防火墙.....................................................26
3.分布式防火墙的总体设计...............................................27
3.1 设计目标...........................................................27
3.1.1 概述...........................................................27
3.1.2 设计目标的需求和安全状况.......................................28
3.2 体系结构...........................................................29
3.3 管理控制中心.......................................................30
3.3.1 网络维护中心...................................................30
3.3.2 策略编辑器.....................................................30
3.3.3 日志分析器.....................................................31
3.3.4 其他...........................................................32
3.4 策略文件...........................................................33
3.5 策略执行器.........................................................36
3.5.1 包过滤.........................................................36
3.5.2 日志...........................................................37
3.5.3 状态检测.......................................................37
3.5.4 入侵预防.......................................................37
3.5.5 与管理控制中心通信.............................................38
3.5.6 处理远程连接器的通信请求.......................................38
3.6 远程端点连接器.....................................................38
3.7 本章小结...........................................................39
4.分布式防火墙的实现...................................................40
4.1 开发平台和开发工具.................................................40
4.2 包过滤模块的实现...................................................40
4.2.1 中间层设计原理.................................................40
4.2.2 编写中间层驱动程序.............................................42
4.2.3 Passthru 流程分析...............................................42
4.2.4 Passthru 中实现过滤功能.......................................45
5.总结和展............................................................50
5.1 总结...............................................................50
5.2 ...............................................................51
参考..............................................................52
攻读硕士学位期间发表的论文..............................................56
致谢
1.绪论
11研究的意义
摘要:

分布式防火墙的设计与研究摘要随着Internet的飞速发展,网络安全问题越来越受到人们的关注,防火墙已经成为网络安全的重要产品,边界防火墙作为一种有效的网络安全技术,提供了对企业内部网络的保护,但在不断扩大的网络规模和日益多样化的网络技术面前,边界防火墙的缺陷也日益突出,它很难实现网络的安全性和网络性能之间的均衡。为了克服传统防火墙的缺陷,而又保留其优点,人们提出了分布式防火墙的概念。分布式防火墙的本质特征可概括为“策略集中制定分散实施,日志分散产生集中保存”。安全策略必须有管理员统一制定,策略必须被推到网络的边缘即主机上实施,日志必须统一收集、集中管理。本文首先分析了目前传统防火墙的作用和存...

展开>> 收起<<
分布式防火墙的设计与研究.doc

共38页,预览4页

还剩页未读, 继续阅读

作者:朱铭铭 分类:高等教育资料 价格:150积分 属性:38 页 大小:811KB 格式:DOC 时间:2024-09-24

开通VIP享超值会员特权

  • 多端同步记录
  • 高速下载文档
  • 免费文档工具
  • 分享文档赚钱
  • 每日登录抽奖
  • 优质衍生服务
/ 38
客服
关注