改善网络防火墙建设
文章来源:未知 文章作者:meng 发布时间:2010-04-18 01:25 字体: [ ]  进入论坛
(单词翻译:双击或拖选)

A firewall is the safety barrier between a computer network and the outside world. Individuals, companies and large organizations alike rely on a firewall being robust1(强健的,健康的) enough to fend2 off(挡开,避开) hackers3 attempting to break into a computer system. However, managing the firewall rules that decide between online friend and foe4 has proved to be complex, error-prone, expensive, and inefficient5 for many large-networked organizations, according to a research team writing in the International Journal of Internet Protocol6(互联网协议) Technology. Muhammad Abedin of the University of Texas at Dallas and colleagues explain that just one error in the set of rules controlling a firewall can open up a critical vulnerability(弱点,易损性) in the system. Such security problem can allow intruders to access data and programs to which they would otherwise be barred potentially leading to breaches7 of privacy, industrial sabotage8(破坏,怠工) , fraud, and theft. The researchers have now developed a method for analyzing9 the activity log files of corporate10 firewalls. Their analysis can determine what rules the firewall is actually applying to incoming and outgoing network traffic and then compare these with the original rules to spot errors and omissions11(省略,疏忽) .

Since the advent12 of the internet, firewall technology has rapidly gone through several generations of innovation and research in a short period of time, and has delivered many powerful and cost-effective services. However, no firewall is perfect and there is always the possibility of human error or computer bugs13 that can inadvertently(非故意地,疏忽地) open routes allowing malicious14(恶毒的,恶意的) users to access off-limits systems or network components15.

Previous researchers have developed analyses of firewall rule sets in an effort to discover potential security problems. However, these static approaches ignore the Firewall log files which change constantly but can provide a rich source of data on network traffic. Analysis, or traffic mining, of log files could potentially offer a much more rigorous way to assess the protection a Firewall is providing.

"By comparing the extracted rules with the original rules, we can easily find if there is any anomaly(不规则,异常) in the original rules, and if there is any defect in the implementation16(履行,实现) ," the researchers explain. "Our experiments show that the effective firewall rules can be regenerated17 to a high degree of accuracy from just a small amount of data."

The approach also has the advantage of detecting anomalies(异常现象,反常现象) that lead to omissions in the logs themselves, as such "shadowed" entries are revealed as gaps when the extracted rules are compared to the original rules.

"Analysis of firewall policy rules using traffic mining techniques" in International Journal of Internet Protocol Technology, 2010, 5, 3-22



点击收听单词发音收听单词发音  

1 robust FXvx7     
adj.强壮的,强健的,粗野的,需要体力的,浓的
参考例句:
  • She is too tall and robust.她个子太高,身体太壮。
  • China wants to keep growth robust to reduce poverty and avoid job losses,AP commented.美联社评论道,中国希望保持经济强势增长,以减少贫困和失业状况。
2 fend N78yA     
v.照料(自己),(自己)谋生,挡开,避开
参考例句:
  • I've had to fend for myself since I was 14.我从十四岁时起就不得不照料自己。
  • He raised his arm up to fend branches from his eyes.他举手将树枝从他眼前挡开。
3 hackers dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
参考例句:
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
4 foe ygczK     
n.敌人,仇敌
参考例句:
  • He knew that Karl could be an implacable foe.他明白卡尔可能会成为他的死敌。
  • A friend is a friend;a foe is a foe;one must be clearly distinguished from the other.敌是敌,友是友,必须分清界限。
5 inefficient c76xm     
adj.效率低的,无效的
参考例句:
  • The inefficient operation cost the firm a lot of money.低效率的运作使该公司损失了许多钱。
  • Their communication systems are inefficient in the extreme.他们的通讯系统效率非常差。
6 protocol nRQxG     
n.议定书,草约,会谈记录,外交礼节
参考例句:
  • We must observe the correct protocol.我们必须遵守应有的礼仪。
  • The statesmen signed a protocol.那些政治家签了议定书。
7 breaches f7e9a03d0b1fa3eeb94ac8e8ffbb509a     
破坏( breach的名词复数 ); 破裂; 缺口; 违背
参考例句:
  • He imposed heavy penalties for breaches of oath or pledges. 他对违反誓言和保证的行为给予严厉的惩罚。
  • This renders all breaches of morality before marriage very uncommon. 这样一来,婚前败坏道德的事就少见了。
8 sabotage 3Tmzz     
n.怠工,破坏活动,破坏;v.从事破坏活动,妨害,破坏
参考例句:
  • They tried to sabotage my birthday party.他们企图破坏我的生日晚会。
  • The fire at the factory was caused by sabotage.那家工厂的火灾是有人蓄意破坏引起的。
9 analyzing be408cc8d92ec310bb6260bc127c162b     
v.分析;分析( analyze的现在分词 );分解;解释;对…进行心理分析n.分析
参考例句:
  • Analyzing the date of some socialist countries presents even greater problem s. 分析某些社会主义国家的统计数据,暴露出的问题甚至更大。 来自辞典例句
  • He undoubtedly was not far off the mark in analyzing its predictions. 当然,他对其预测所作的分析倒也八九不离十。 来自辞典例句
10 corporate 7olzl     
adj.共同的,全体的;公司的,企业的
参考例句:
  • This is our corporate responsibility.这是我们共同的责任。
  • His corporate's life will be as short as a rabbit's tail.他的公司的寿命是兔子尾巴长不了。
11 omissions 1022349b4bcb447934fb49084c887af2     
n.省略( omission的名词复数 );删节;遗漏;略去或漏掉的事(或人)
参考例句:
  • In spite of careful checking, there are still omissions. 饶这么细心核对,还是有遗漏。 来自《现代汉英综合大词典》
  • It has many omissions; even so, it is quite a useful reference book. 那本书有许多遗漏之处,即使如此,尚不失为一本有用的参考书。 来自《现代汉英综合大词典》
12 advent iKKyo     
n.(重要事件等的)到来,来临
参考例句:
  • Swallows come by groups at the advent of spring. 春天来临时燕子成群飞来。
  • The advent of the Euro will redefine Europe.欧元的出现将重新定义欧洲。
13 bugs e3255bae220613022d67e26d2e4fa689     
adj.疯狂的,发疯的n.窃听器( bug的名词复数 );病菌;虫子;[计算机](制作软件程序所产生的意料不到的)错误
参考例句:
  • All programs have bugs and need endless refinement. 所有的程序都有漏洞,都需要不断改进。 来自《简明英汉词典》
  • The sacks of rice were swarming with bugs. 一袋袋的米里长满了虫子。 来自《简明英汉词典》
14 malicious e8UzX     
adj.有恶意的,心怀恶意的
参考例句:
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
15 components 4725dcf446a342f1473a8228e42dfa48     
(机器、设备等的)构成要素,零件,成分; 成分( component的名词复数 ); [物理化学]组分; [数学]分量; (混合物的)组成部分
参考例句:
  • the components of a machine 机器部件
  • Our chemistry teacher often reduces a compound to its components in lab. 在实验室中化学老师常把化合物分解为各种成分。
16 implementation 2awxV     
n.实施,贯彻
参考例句:
  • Implementation of the program is now well underway.这一项目的实施现在行情看好。
17 regenerated 67df9da7e5af2af5acd8771deef0296f     
v.新生,再生( regenerate的过去式和过去分词 )
参考例句:
  • They are regarded as being enveloped in regenerated gneisses. 它们被认为包围在再生的片麻岩之中。 来自辞典例句
  • The party soon regenerated under her leadership. 该党在她的领导下很快焕然一新。 来自辞典例句
TAG标签: computer network firewall
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:点击我更换图片