Font Size: a A A

Performance Evaluation Model And Optimization Of WEB Security Gateway

Posted on:2017-12-10Degree:MasterType:Thesis
Country:ChinaCandidate:F ChangFull Text:PDF
GTID:2348330518470822Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The combination of Internet technology and people's life is increasingly close, and its own information security issues are more and more serious personal influence. WEB security gateway, as the first security gate of the Internet and user network, plays an important role in the whole security system. As a security product deployed in the network, its performance directly determines the quality of the user network and Internet communication. In this paper,there are two important research content. Firstly, the web security gateway system for establishing mathematical model for performance evaluation, a reasonable assessment of the system resource allocation situation, find out the maximum system throughput, the resource allocation; secondly, memory management for further optimization of the system and improve the system performance.In the performance evaluation model of WEB security gateway, the current research mainly based on queuing theory. There are two deficiencies in the model established by the domestic and foreign research scholars. One is only for a single service desk, and the other is the weak correlation between the services. According to these two shortcomings, this paper describes a performance evaluation model of WEB security gateway based on queuing theory.This model is divided into two levels, each level contains a number of service stations. The first layer is the network layer, the main analysis of the data packet IP, TCP protocol packet;the second layer is the application layer, the main analysis of the data packet application layer data message content. In this paper, based on the case of the first level throughput, the overall throughput of the system is derived by using the queuing theory of the Irish model in the second layer. Finally, this paper uses the model to derive the theoretical derivation, and the use of C language to write a simple security gateway system,confirmed the theoretical values obtained by the model and the experimental data in the experiment of mutual consistency. By experiment, the error range of the theoretical value and the experimental value is 4%.Whether the data packets in the WEB security network to wait for the service desk or the service desk, or analytical data packets, are related to the memory operation. Therefore, this paper mainly focuses on the performance optimization of the security gateway in terms of memory management. Because the WEB security gateway needs to decode and extract the WEB data in the application layer content detection, it leads to the use of memory block size is not fixed in the process of data packet processing. Therefore, there will be a lot of memory waste in the use of fixed memory pool. And the use of dynamic memory pool, but also in the network traffic fluctuations occur when the memory jitter phenomenon. In view of the above two points,this paper describes a non fixed packet length WEB security gateway memory management model. The management model is divided into two levels of network layer and application layer,which can not only dynamically allocate memory block size,improve memory usage rate, but also can cope with the traffic situation and prevent the deterioration of memory pool. Through memory usage and memory management time consumption of two experiments can be known. In the memory usage, this paper uses the model to compare with the memory usage rate of the fixed length memory pool, and finally, the usage rate of the fixed length memory pool is about 20% higher than that of the fixed length memory pool. In terms of the time consumption of the management of memory, the WEB security gateway for the non fixed packet length is far less than the time consumption of Malloc and PTmalloc.
Keywords/Search Tags:WEB Security Gateway, Queuing Theory Model, Irish Service Time, Dynamic Memory Pool
PDF Full Text Request
Related items