网络疑似入侵环境下的最优接口访问控制模型仿真
DOI:
CSTR:
作者:
作者单位:

南京审计大学金审学院 工学院;应天职业技术学院 工学院,江苏省广电有线信息网络股份有限公司

作者简介:

通讯作者:

中图分类号:

TP393

基金项目:


Simulation of optimal interface access control model in the network suspected intrusion
Author:
Affiliation:

Institute of technology Nanjing Audit University Jinshen College;Institute of technology YingTian College,Jiangsu Broadcasting Cable Information Network Corp Ltd

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    在网络疑似入侵环境下通过最优接口访问控制实现网络入侵的可靠性拦截,保障网络安全。传统方法采用自由链路分散控制模型进行网络入侵检测和接口访问控制,在受到较大的特征干扰下,入侵访问控制和拦截性能不好。提出一种基于自适应循环堆栈接口调度的网络疑似入侵环境下的最优接口访问控制模型。进行接口访问控制模型总体设计及组件模块分析,接口访问控制系统包括通信库、协议库、核心控制库和资源库,采用小波包自适应波束调制方法进行入侵检测算法设计,作为接口访问控制系统软件核心。通过SDICmdCon寄存器设置网络疑似入侵环境下的最优接口的内核,在嵌入式Linux环境下通过自适应循环堆栈接口调度实现接口访问控制的软件开发。仿真结果表明,采用该模型进行网络入侵检测,准确检测性能较好,通过最优接口访问控制,实现对网络入侵数据的准确识别和拦截。

    Abstract:

    In the network environment, the reliability of network intrusion is intercepted by the optimal interface access control, which can ensure the network security. In the traditional method, the free link distributed control model is used in the network intrusion detection and interface access control, which is not good for the intrusion access control and the interception performance under the interference of the larger features. An optimal interface access control model based on adaptive loop stack interface scheduling in the network is proposed. Interface analysis of access control model of the overall design and module and interface to access control system includes a communication library, protocol library, core control and resource libraries, using wavelet packet adaptive beam modulation method for intrusion detection algorithm design, as interface access control system is the core of the software. By setting up the optimal interface of the network in the SDICmdCon register, the software development of the interface access control is realized through the adaptive loop stack interface in the embedded Linux environment. The simulation results show that the model is used for network intrusion detection, accurate detection performance is better, through the optimal access control, to achieve the accurate identification and interception of network intrusion data.

    参考文献
    相似文献
    引证文献
引用本文

刘珏,王 永.网络疑似入侵环境下的最优接口访问控制模型仿真计算机测量与控制[J].,2016,24(11).

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2016-06-13
  • 最后修改日期:2016-06-13
  • 录用日期:2016-07-11
  • 在线发布日期: 2016-11-30
  • 出版日期:
文章二维码