Font Size: a A A

Linux Firewall Rule Optimization

Posted on:2007-02-21Degree:MasterType:Thesis
Country:ChinaCandidate:Z W ZhuFull Text:PDF
GTID:2208360185471191Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development and broad application of Internet worldwide,it brings convenience and efficiency to people's life. At the same time,a lot ofproblems occur,including the one about Internet information security.As a tool to deal with security problems in Internet,firewalls play an essential role.Just because of it special role,whether firewalls are set correctly derictly affects its effectiveness and in turn affects the entire Internet.Therefore,we should pay more attention to the setting of firewalls.In order to solue the problems that firewalls have complex settings and that after being set,those problems caused by repetition and overloading by the people who set firewalls cannot be deleted,the present thesis introduces a set of improved cariculating method of firewalls,based on tree modes.The thesis succeeds in the improved programme exploration of firewalls in the context of Linux and the general steps include:firstly,a feasibility test is conducted for the improvement of firewall suit;an improved flux is made;problems involved are logicalized and the improvement rules are fixed.secondly the firewall ruled and files are written and are analized lexically and grammatically by using LEX/YACC.and the grammal tree is built for firewall rules.Furthermore,parital improveable and specific environmental parameters are clarified .Finally,the translator and editor are achieved, with the experiment result.According to the algorithm is hard to be determed by deploy worker, the paper present an automozation firewall suit for networking conception. The key is determed the algorithm with probe tools to analysis networking flux in really networking environment. In the leading of this conception we do a lots of experiments and constructed an atomization firewall model, and we get a respected result.In this paper we talk about all advantage and disadvantage in this mode, and do a respect of the further automaztion firewall.
Keywords/Search Tags:Linux, firewall, rules optimiz, fIptables, Lex/Yacc
PDF Full Text Request
Related items