J4 ›› 2010, Vol. 28 ›› Issue (01): 34-.

• 论文 • 上一篇    下一篇

入侵防御系统可信通信协议的设计与实现

袁本雯1|赵 阔2|孙鸣迪2|胡 亮 2
  

  1. 1. 吉林广播电视大学| 长春 130022;2. 吉林大学 |计算机科学与技术学院| 长春 130012
  • 出版日期:2010-01-20 发布日期:2010-04-06
  • 通讯作者: 胡亮(1968— ),男,江苏句容人,吉林大学教授,博士生导师,主要从事网络安全与网格计算研究, (Tel) 86-13904322225 E-mail:hul@jlu.edu.cn
  • 作者简介:袁本雯(1960— ),女,吉林集安人,吉林广播电视大学讲师,主要从事机电一体化和计算机网络研究, (Tel)86-13578765591(E-mail)yuanbw@jlrtvu.jl.cn;通讯作者:胡亮(1968— )|男,江苏句容人,吉林大学教授,博士生导师,主要从事网络安全与网格计算研究, (Tel) 86-13904322225 (E-mail) hul@jlu.edu.cn
  • 基金资助:

    国家自然科学基金资助项目(60873235); 教育部新世纪优秀人才支持计划基金资助项目(NCET-06-300); 吉林省科技支撑计划重点基金资助项目(20080318)〖

Design and Implementation of Trusted Communication Protocol for Intrusion Prevention System

YUAN Ben-wen, ZHAO Kuo, SUN Ming-di, HU Liang   

  1. 1.Jilin Radio and TV University, Changchun 130022, China;2.College of Computer Science and Technology, Jilin University, Changchun 130012, China
  • Online:2010-01-20 Published:2010-04-06

摘要:

入侵防御系统主要基于入侵检测系统和防火墙之间的联动,而它们各自能识别和维护的数据格式往往是不同的。此外,这些敏感数据通常是在开放的网络环境中传输的,面临各种安全威胁。为此,引入可信通信的概念,设计并实现了基于XML(eXtensible Markup Language)的可信通信协议。与同类工作相比,该协议可实现异构操作环境下入侵检测系统与防火墙之间的安全数据传输,并可进一步扩展支持各种网络安全产品和网络管理设备,对于实现这些设备之间的数据融合,检测复杂的分布式网络攻击具有一定的参考价值。

关键词: 可信, 通信协议, 可扩展标记语言, 传输层安全协议, 公共对象请求代理体系结构

Abstract:

Intrusion prevention system are mainly based on the correlation between intrusion detection systems and firewalls, and the data format applied to identification and maintenance for both is usually different. These sensitive data are often transmitted in the open network environment, which faced with various security threats. To solve these problems, the trusted communication is introduced.The design and implementation of trusted communication protocol based on XML(eXtensible Markup Language) is provided. Compared to related works, this protocol achieves the implementation of secure data transmission between intrusion detection systems and firewalls in the heterogeneous environments, and scaled to various network security products and network management devices, which contributes to the data fusion among these devices and the detection of distributed network attacks.

Key words: trusted, communication protocol, extensible markup language(XML), transport layer security(TLS), common object request broker architecture(CORBA)

中图分类号: 

  • TP393