检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]江南计算所,江苏无锡214083
出 处:《计算机安全》2011年第10期6-8,共3页Network & Computer Security
摘 要:针对普通VPN实现机制易受攻击的缺陷,提出了一种基于MII接口的硬件IP包过滤技术。利用物理层芯片Back-to-Back技术,在普通VPN机制中增加硬件IP包过滤模块,切断CPU模块和外网的物理直连,防范外网黑客对VPN设备的CPU操作系统和协议栈的扫描、阻塞等攻击。对比普通VPN实现机制,阐述了改进的VPN逻辑原理和主要的包过滤流程。实现外网进来的IP包匹配过滤后才进入后端的CPU,保证了CPU模块的安全性。该IP包过滤技术无需CPU和协议栈支持,抗攻击力强,成本低廉,各模块独立性好,修改灵活。For VPN vulnerability,this paper presents a hardware IP packet-filtering technology based on MII interface.Use of the physical layer chip Back-to-Back technology,we increase a hardware IP packet-filtering module in VPN,so we can cut off the directly connection between CPU module and WAN,prevent scanning,blocking and other attacks to CPU operating system and protocol stack from hackers of WAN.Through a comparison,this paper explains logical structure of the improved VPN and the main IP packet-filtering processes.The IP packets from WAN are matched and filtered before going into CPU,ensure the security of CPU module.The IP packet-filtering method does not involve CPU and TCP/IP protocol stack,and it has many advantages,such as anti-attack ability,low cost,the independence of each module,flexible modification.
关 键 词:以太网 MII接口 PHY芯片 FPGA IP包过滤
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.219.68.172