计算机应用 ›› 2015, Vol. 35 ›› Issue (11): 3083-3086.DOI: 10.11772/j.issn.1001-9081.2015.11.3083

• 2015年全国开放式分布与并行计算学术年会(DPCS 2015)论文 • 上一篇    下一篇

防火墙规则间包含关系的解析方法

殷奕1,2, 汪芸1   

  1. 1. 东南大学 计算机科学与工程学院, 南京 211189;
    2. 南京师范大学 计算机科学与技术学院, 南京 210023
  • 收稿日期:2015-06-17 修回日期:2015-07-28 发布日期:2015-11-13
  • 通讯作者: 殷奕(1978-),女,江苏镇江人,讲师,博士,主要研究方向:网络安全、防火墙、入侵检测系统.
  • 作者简介:汪芸(1969-),女,江苏苏州人,教授,博士,CCF会员,主要研究方向:分布式计算、云计算、大数据、传感器网络.
  • 基金资助:
    国家自然科学基金资助项目(60973122);国家973计划项目.

Analysis method of inclusion relations between firewall rules

YIN Yi1,2, WANG Yun1   

  1. 1. School of Computer Science and Engineering, Southeast University, Nanjing Jiangsu 211189, China;
    2. School of Computer Science and Technology, Nanjing Normal University, Nanjing Jiangsu 210023, China
  • Received:2015-06-17 Revised:2015-07-28 Published:2015-11-13

摘要: 针对防火墙规则集中规则间的相互关系难以把握,从而导致防火墙无法正确地过滤数据包的问题,提出了一种基于集合理论的规则间包含关系的解析方法.该方法在不考虑规则动作的情况下,基于集合理论的包含关系来解析和分类规则之间的关系,简化了分析规则间相互关系的过程.并且使用高效的函数式编程语言Haskell实现了所提出的方法,整体代码简洁、易于维护和扩展.实验结果表明,对于中小规模的防火墙规则集,能够快速而有效地解析规则间的包含关系,并且能够为后续的规则间的异常检测提供重要的依据.

关键词: 网络安全, 防火墙, 规则集, 函数式编程语言, 集合理论

Abstract: It is difficult to understand all the relations between firewall rules. Poorly-organized rules may cause the problem that firewall could not filter packets correctly. In order to solve this problem, an analysis method of inclusion relations between firewall rules based on set theory was proposed. Based on the inclusion relations in set theory, the proposed method analyzed and classified the relations between firewall rules without considering the actions of rules. The proposed method simplified the process of analysis relations between firewall rules, and it was implemented by using a functional programming language, Haskell. The whole Haskell codes were concise, which also were easy to maintain and expand. The experimental results show that, with regard to medium scale sets of rules, the proposed method can analyze the inclusion relations between firewall rules rapidly and effectively. The proposed method also provides an important basis for the succeeding rules conflict detection.

Key words: network security, firewall, rules set, functional programming language, set theory

中图分类号: