计算机科学 ›› 2017, Vol. 44 ›› Issue (Z11): 334-337.doi: 10.11896/j.issn.1002-137X.2017.11A.070

• 信息安全 • 上一篇    下一篇

基于深度包检测的防火墙系统设计

路琪,黄芝平,鲁佳琪   

  1. 国防科技大学机电工程与自动化学院 长沙410073,国防科技大学机电工程与自动化学院 长沙410073,国防科技大学机电工程与自动化学院 长沙410073
  • 出版日期:2018-12-01 发布日期:2018-12-01

System Design of Firewall Based on Deep Packet Inspection

LU Qi, HUANG Zhi-ping and LU Jia-qi   

  • Online:2018-12-01 Published:2018-12-01

摘要: 随着互联网的飞速发展,防火墙作为网络安全防护的重要手段已经成为了人们研究的重点。为了能够高效地过滤无关数据报文、抵御恶意攻击、保障网络的安全稳定运行,在研究深度包检测技术的基础上,提出了一种基于现场可编程门阵列、三态内容可寻址寄存器架构而实现的硬件防火墙系统。测试表明,该系统能够满足实际要求。

关键词: 深度包检测,硬件防火墙,现场可编程门阵列,三态内容可寻址寄存器

Abstract: With the rapid development of the Internet,as an important means of network security,firewall has become the focus of research.In order to effectively filter the irrelevant data packets,resist the malicious attacks,and ensure the safe and stable operation of the network,on the basis of researching on the deep packet inspection (DPI) technology,a firewall system based on field programmable gate array (FPGA) and ternary content addressable memory (TCAM) was presented.The test results show that the designed firewall system based on deep packet inspection technology can meet the actual requirements.

Key words: DPI,Hardware firewall,Field programmable gate array,Ternary content addressable memory

[1] 陈宁,李忠.一种防火墙新技术——深度包检测技术[J].重庆科技学院学报(自然科学版),2007,9(3):69-79.
[2] 陈世文,黄万伟,曹建业.一种深度包检测引擎的FPGA硬件实现[J].测控技术,2014,33(6):100-109.
[3] 汪立东,钱丽萍.网络流量分类方法与实践[M].北京:人民邮电出版社,2013.
[4] 王建东,祝超,谢应科,等.基于FPGA的万兆流量并行实时处理系统研究[J].计算机研究与发展,2009,46(2):177-185.
[5] 鲁佳琪,黄芝平,刘纯武,等.基于FPGA+TCAM架构的网络分流系统的设计与实现[J].微型机与应用,2016,35(15):65-71.
[6] 朱晴.基于FPGA大流量数据识别与分流系统的设计与实现[D].南京:南京航空航天大学,2011.
[7] ZHAN Y R.Deep Packet Inspection Based on Many-Core Platform[J].Journal of Computer and Communications,2015,3(5):1-6.
[8] CHU W C C,CHAO H C,YANG S J H,et al.Cost Analysis of Deep Packet Inspection in PCC Architecture[M].IOSPress:2015.
[9] SHARMA J,SINGH M.CUDA based Rabin-Karp Pattern Ma-tching for Deep Packet Inspectionona Multicore GPU[J].International Journal of Computer Network and Information Security(IJCNIS),2015,7(10):70-77.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!