欢迎来到英语文章阅读网,英语美文-英文短文-英语作文供您参考!
组词大全

英语科普

当前位置:主页 > 英语科普 >

改善网络防火墙建设

时间:2021-03-29|栏目:英语科普|点击:

A firewall is the safety barrier between a computer network and the outside world. Individuals, companies and large organizations alike rely on a firewall being robust(强健的,健康的) enough to fend off(挡开,避开) hackers attempting to break into a computer system. However, managing the firewall rules that decide between online friend and foe has proved to be complex, error-prone, expensive, and inefficient for many large-networked organizations, according to a research team writing in the International Journal of Internet Protocol(互联网协议) Technology. Muhammad Abedin of the University of Texas at Dallas and colleagues explain that just one error in the set of rules controlling a firewall can open up a critical vulnerability(弱点,易损性) in the system. Such security problem can allow intruders to access data and programs to which they would otherwise be barred potentially leading to breaches of privacy, industrial sabotage(破坏,怠工) , fraud, and theft. The researchers have now developed a method for analyzing the activity log files of corporate firewalls. Their analysis can determine what rules the firewall is actually applying to incoming and outgoing network traffic and then compare these with the original rules to spot errors and omissions(省略,疏忽) .

Since the advent of the internet, firewall technology has rapidly gone through several generations of innovation and research in a short period of time, and has delivered many powerful and cost-effective services. However, no firewall is perfect and there is always the possibility of human error or computer bugs that can inadvertently(非故意地,疏忽地) open routes allowing malicious(恶毒的,恶意的) users to access off-limits systems or network components.

Previous researchers have developed analyses of firewall rule sets in an effort to discover potential security problems. However, these static approaches ignore the Firewall log files which change constantly but can provide a rich source of data on network traffic. Analysis, or traffic mining, of log files could potentially offer a much more rigorous way to assess the protection a Firewall is providing.

"By comparing the extracted rules with the original rules, we can easily find if there is any anomaly(不规则,异常) in the original rules, and if there is any defect in the implementation(履行,实现) ," the researchers explain. "Our experiments show that the effective firewall rules can be regenerated to a high degree of accuracy from just a small amount of data."

The approach also has the advantage of detecting anomalies(异常现象, 英语短文带翻译,反常现象) that lead to omissions in the logs themselves, as such "shadowed" entries are revealed as gaps when the extracted rules are compared to the original rules.

"Analysis of firewall policy rules using traffic mining techniques" in International Journal of Internet Protocol Technology, 2010, 5, 3-22

上一篇:禁止食用转化型脂肪酸可预防心脏病

栏    目:英语科普

下一篇:美宇航局拍摄冰岛火山灰卫星图片

本文标题:改善网络防火墙建设

本文地址:http://www.scpproo.com/english/science/33492.html

英语新闻 | 英语美文欣赏 | 英语故事 | 英语科普 | 生活英语 | 英语演讲 | |

重要申明:本站所有的文章和图片全部收集自网络,如果侵犯了您的权利,请与我们联系,我们将在24小时内进行处理、任何非本站因素导致的法律后果,本站均不负任何责任。

Copyright © 2018-2020 英语文章阅读网