CN105743871A - Decision tree-based firewall policy conflict detection method - Google Patents
Decision tree-based firewall policy conflict detection method Download PDFInfo
- Publication number
- CN105743871A CN105743871A CN201410773170.3A CN201410773170A CN105743871A CN 105743871 A CN105743871 A CN 105743871A CN 201410773170 A CN201410773170 A CN 201410773170A CN 105743871 A CN105743871 A CN 105743871A
- Authority
- CN
- China
- Prior art keywords
- firewall policy
- node
- tree
- insert
- detection method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 31
- 238000003066 decision tree Methods 0.000 title claims abstract description 16
- 238000000034 method Methods 0.000 claims abstract description 31
- 230000009471 action Effects 0.000 claims description 21
- 230000008569 process Effects 0.000 claims description 16
- 238000003780 insertion Methods 0.000 claims description 4
- 230000037431 insertion Effects 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 2
- 230000007547 defect Effects 0.000 abstract 1
- 230000009466 transformation Effects 0.000 abstract 1
- 238000001914 filtration Methods 0.000 description 4
- 230000008520 organization Effects 0.000 description 4
- 238000012423 maintenance Methods 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 230000000052 comparative effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000002372 labelling Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004615 ingredient Substances 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000002459 sustained effect Effects 0.000 description 1
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Sequence number | Agreement | Source address | Source port | Destination address | Destination interface | Action fields |
1 | any | *.*.*.* | * | *.*.*.* | * | accept |
2 | tcp | *.*.*.* | * | *.*.*.* | * | accept |
3 | tcp | *.*.*.* | * | *.*.*.* | 80 | accept |
4 | tcp | *.*.*.* | * | 11.128.3.* | 80 | accept |
5 | tcp | *.*.*.* | * | 11.128.3.2 | 80 | deny |
6 | tcp | 12.109.36.* | * | 11.128.3.* | 80 | accept |
7 | tcp | 12.109.36.* | * | 11.128.3.23 | 80 | accept |
8 | tcp | 12.109.36.5 | * | *.*.*.* | 80 | accept |
9 | tcp | 12.109.36.5 | * | 11.128.3.* | 80 | deny |
10 | tcp | 12.109.35.* | * | 11.128.3.23 | 80 | accept |
11 | tcp | 12.109.35.35 | * | 11.128.5.33 | 21 | accept |
12 | udp | 12.109.36.5 | * | 11.128.4.53 | 21 | accept |
13 | udp | 12.109.36.5 | * | 11.128.4.53 | 21 | deny |
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410773170.3A CN105743871B (en) | 2014-12-12 | 2014-12-12 | A kind of firewall policy collision detection method based on decision tree |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410773170.3A CN105743871B (en) | 2014-12-12 | 2014-12-12 | A kind of firewall policy collision detection method based on decision tree |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105743871A true CN105743871A (en) | 2016-07-06 |
CN105743871B CN105743871B (en) | 2019-03-12 |
Family
ID=56241629
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410773170.3A Active CN105743871B (en) | 2014-12-12 | 2014-12-12 | A kind of firewall policy collision detection method based on decision tree |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105743871B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453387A (en) * | 2016-07-28 | 2017-02-22 | 电子科技大学 | Security strategy conflict detecting and eliminating method based on Hicuts algorithm |
CN107196871A (en) * | 2017-04-14 | 2017-09-22 | 同济大学 | A kind of stream rule conflict detection method and system based on alias stipulations tree |
CN110290152A (en) * | 2019-07-18 | 2019-09-27 | 成都安恒信息技术有限公司 | Firewall rule engine time complexity appraisal procedure based on probability weight path |
CN110336841A (en) * | 2019-08-09 | 2019-10-15 | 深圳证券交易所 | Detection method, detection device and the readable storage medium storing program for executing of firewall rule |
CN111708733A (en) * | 2020-05-28 | 2020-09-25 | 浪潮电子信息产业股份有限公司 | Policy detection method, system, equipment and computer readable storage medium |
CN112887316A (en) * | 2021-01-29 | 2021-06-01 | 深圳市风云实业有限公司 | Access control list conflict detection system and method based on classification |
CN113691488A (en) * | 2020-05-19 | 2021-11-23 | 奇安信科技集团股份有限公司 | Access control method, apparatus, device and medium executed by firewall device |
CN114168800A (en) * | 2021-11-26 | 2022-03-11 | 哈尔滨工程大学 | Conflict detection method based on B + tree and bitmap index fusion tree |
CN114172681A (en) * | 2021-10-25 | 2022-03-11 | 中国农业银行股份有限公司福建省分行 | Firewall policy management method and system |
CN115065613A (en) * | 2022-06-08 | 2022-09-16 | 北京启明星辰信息安全技术有限公司 | Network connectivity analysis system and analysis method based on firewall configuration |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050138413A1 (en) * | 2003-12-11 | 2005-06-23 | Richard Lippmann | Network security planning architecture |
US20070038775A1 (en) * | 2002-10-04 | 2007-02-15 | Ipolicy Networks, Inc. | Rule engine |
CN101958903A (en) * | 2010-10-09 | 2011-01-26 | 南京博同科技有限公司 | Method for realizing high-performance firewall based on SOC and parallel virtual firewall |
CN103905464A (en) * | 2014-04-21 | 2014-07-02 | 西安电子科技大学 | Network security strategy verification system and method on basis of formalizing method |
-
2014
- 2014-12-12 CN CN201410773170.3A patent/CN105743871B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070038775A1 (en) * | 2002-10-04 | 2007-02-15 | Ipolicy Networks, Inc. | Rule engine |
US20050138413A1 (en) * | 2003-12-11 | 2005-06-23 | Richard Lippmann | Network security planning architecture |
CN101958903A (en) * | 2010-10-09 | 2011-01-26 | 南京博同科技有限公司 | Method for realizing high-performance firewall based on SOC and parallel virtual firewall |
CN103905464A (en) * | 2014-04-21 | 2014-07-02 | 西安电子科技大学 | Network security strategy verification system and method on basis of formalizing method |
Non-Patent Citations (4)
Title |
---|
P.GUPTA 等: ""Algorithms for Packet Classification"", 《IEEE NETWORK》 * |
李林: "防火墙规则集关键技术研究", 《中国博士学位论文全文数据库 信息科技辑》 * |
赵启斌 等: ""防火墙过滤规则异常的研究"", 《计算机工程》 * |
陈文惠: ""防火墙系统策略配置研究"", 《中国博士学位论文全文数据库 信息科技辑》 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453387B (en) * | 2016-07-28 | 2019-08-13 | 电子科技大学 | Security strategy collision detection and removing method based on Hicuts algorithm |
CN106453387A (en) * | 2016-07-28 | 2017-02-22 | 电子科技大学 | Security strategy conflict detecting and eliminating method based on Hicuts algorithm |
CN107196871A (en) * | 2017-04-14 | 2017-09-22 | 同济大学 | A kind of stream rule conflict detection method and system based on alias stipulations tree |
CN110290152A (en) * | 2019-07-18 | 2019-09-27 | 成都安恒信息技术有限公司 | Firewall rule engine time complexity appraisal procedure based on probability weight path |
CN110290152B (en) * | 2019-07-18 | 2021-10-15 | 成都安恒信息技术有限公司 | Firewall rule engine time complexity evaluation method based on probability weighted path |
CN110336841A (en) * | 2019-08-09 | 2019-10-15 | 深圳证券交易所 | Detection method, detection device and the readable storage medium storing program for executing of firewall rule |
CN113691488A (en) * | 2020-05-19 | 2021-11-23 | 奇安信科技集团股份有限公司 | Access control method, apparatus, device and medium executed by firewall device |
CN111708733A (en) * | 2020-05-28 | 2020-09-25 | 浪潮电子信息产业股份有限公司 | Policy detection method, system, equipment and computer readable storage medium |
CN112887316A (en) * | 2021-01-29 | 2021-06-01 | 深圳市风云实业有限公司 | Access control list conflict detection system and method based on classification |
CN114172681A (en) * | 2021-10-25 | 2022-03-11 | 中国农业银行股份有限公司福建省分行 | Firewall policy management method and system |
CN114172681B (en) * | 2021-10-25 | 2024-05-24 | 中国农业银行股份有限公司福建省分行 | Firewall policy management method and system |
CN114168800A (en) * | 2021-11-26 | 2022-03-11 | 哈尔滨工程大学 | Conflict detection method based on B + tree and bitmap index fusion tree |
CN114168800B (en) * | 2021-11-26 | 2024-09-13 | 哈尔滨工程大学 | Conflict detection method based on B+ tree and bitmap index fusion tree |
CN115065613A (en) * | 2022-06-08 | 2022-09-16 | 北京启明星辰信息安全技术有限公司 | Network connectivity analysis system and analysis method based on firewall configuration |
CN115065613B (en) * | 2022-06-08 | 2024-01-12 | 北京启明星辰信息安全技术有限公司 | Network connectivity analysis system and analysis method based on firewall configuration |
Also Published As
Publication number | Publication date |
---|---|
CN105743871B (en) | 2019-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105743871A (en) | Decision tree-based firewall policy conflict detection method | |
CN104580027B (en) | A kind of OpenFlow message forwarding methods and equipment | |
CN105282169A (en) | DDoS attack warning method and system based on SDN controller threshold | |
CN103281333A (en) | Forwarding method and device of data flow | |
CN104883347A (en) | Network security regulation conflict analysis and simplification method | |
Zhang et al. | A firewall rules optimized model based on service-grouping | |
Zhang et al. | Symbolic router execution | |
CN107733867A (en) | It is a kind of to find Botnet and the method and system of protection | |
Gogoi et al. | A rough set–based effective rule generation method for classification with an application in intrusion detection | |
CN1232922C (en) | Method for improving fire wall performance | |
CN105991639A (en) | Network attack path analysis method | |
Chomsiri et al. | Firewall rules analysis. | |
Komisarek et al. | Network Intrusion Detection in the Wild-the Orange use case in the SIMARGL project | |
Hubballi et al. | Towards reducing false alarms in network intrusion detection systems with data summarization technique | |
Jégou et al. | Combining restarts, nogoods and decompositions for solving csps | |
Castiglione et al. | An enhanced firewall scheme for dynamic and adaptive containment of emerging security threats | |
Hamdi et al. | A cloud-based architecture for network attack signature learning | |
Davy et al. | On harnessing information models and ontologies for policy conflict analysis | |
Thakar et al. | An approach to improve performance of a packet-filtering firewall | |
CN112887316A (en) | Access control list conflict detection system and method based on classification | |
Hanamsagar et al. | Firewall anomaly management: A survey | |
Rezvani et al. | Analyzing and resolving anomalies in firewall security policies based on propositional logic | |
Zhang et al. | Detecting and Resolving Flow Entries Collisions in Software Defined Networks | |
CN102801634A (en) | Method for intelligently identifying three-in-one network traffic | |
Saad et al. | Context-aware intrusion alerts verification approach |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
CB02 | Change of applicant information |
Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing Applicant after: State Grid Corporation of China Applicant after: China Electric Power Research Institute Applicant after: GLOBAL ENERGY INTERCONNECTION Research Institute Applicant after: JIANGSU ELECTRIC POWER Co. Applicant after: INFORMATION & TELECOMMUNICATION BRANCH OF STATE GRID JIANGSU ELECTRIC POWER Co. Applicant after: BEIJING SAFE-CODE TECHNOLOGY Co.,Ltd. Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing Applicant before: State Grid Corporation of China Applicant before: China Electric Power Research Institute Applicant before: STATE GRID SMART GRID Research Institute Applicant before: JIANGSU ELECTRIC POWER Co. Applicant before: INFORMATION & TELECOMMUNICATION BRANCH OF STATE GRID JIANGSU ELECTRIC POWER Co. Applicant before: BEIJING SAFE-CODE TECHNOLOGY Co.,Ltd. |
|
COR | Change of bibliographic data | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |