...
首页> 外文期刊>Information Security, IET >Modelling and analysis of rule-based network security middleboxes
【24h】

Modelling and analysis of rule-based network security middleboxes

机译:基于规则的网络安全中间盒的建模与分析

获取原文
获取原文并翻译 | 示例

摘要

This study presents an analytical model for rule-based network security middleboxes as those of network firewalls, intrusion detection systems and email spam filters. In these systems, incoming packets carrying requests arrive at the middlebox and obtain queued for processing in multiple stages. The stages consist of first a main stage for packet processing and then subsequent stages of rulebase interrogation in which rules or conditions are checked sequentially until a match is triggered. The service at these stages is characterised to be mutually exclusive; that is, only one stage is active at any time. The authors derive useful formulas that can predict the middlebox performance, taking into account its incoming request rate, the queue size and the processing capacity of the middlebox, and thereby proper engineering capacity of the middlebox can be achieved.
机译:这项研究为基于规则的网络安全中间箱(如网络防火墙,入侵检测系统和电子邮件垃圾邮件过滤器)提供了一种分析模型。在这些系统中,携带请求的传入数据包到达中间盒,并排队等待进行多个阶段的处理。这些阶段首先包括用于数据包处理的主要阶段,然后是规则库询问的后续阶段,在该阶段中,顺序检查规则或条件,直到触发匹配为止。这些阶段的服务具有互斥的特征。也就是说,任何时候都只有一个阶段处于活动状态。作者得出有用的公式,可以考虑中间盒的传入请求速率,队列大小和中间盒的处理能力,从而预测中间盒的性能,从而可以实现中间盒的适当工程能力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号