优秀的毕业设计论文网
计算机 JAVA 电子信息 单片机 机械机电 模具 土木工程 建筑结构 论文
热门搜索词:网络 ASP.NET 汽车 电气 数控 PLC

个人防火墙技术与实现

以下是资料介绍,如需要完整的请充值下载.
1.无需注册登录,支付后按照提示操作即可获取该资料.
2.资料以网页介绍的为准,下载后不会有水印.资料仅供学习参考之用.
  
资料介绍:

摘  要

随着互联网的飞速发展,越来越多的企业和用户连接到互联网中。人们在充分享受着互联网所带来的方便和高效的同时,也不断受到各种计算机病毒感染和黑客恶意攻击的侵扰。在网络安全解决方案中,建立或设置防火墙是一个非常关键和有效的环节。然而,当前市场上的防火墙产品多为企业级的网关型防火墙,而针对个人用户的防火墙产品则较少。针对这种情况,本文设计和实现了一个Windows操作系统下的个人防火墙软件。

think58

[来源:http://www.think58.com]

[资料来源:www.THINK58.com]

本文首先论述了防火墙的背景知识,包括防火墙的基本概念和防火墙技术的发展情况等。然后对设计个人防火墙所需要的主要技术进行了详细介绍,包括网络协议TCP/IP、Winsock2 SPI、NDIS中间驱动程序和入侵检测。在此基础上,以我设计的个人防火墙PFWall为例,从功能分析、模块设计、界面设计、文件结构定义到系统的具体实现,比较完整地叙述了个人防火墙的开发过程。

[资料来源:http://www.THINK58.com]

PFWall个人防火墙采用了Winsock2 SPI编程技术与NDIS中间驱动技术相结合的双重包过滤技术,很好地实现了对网络活动状态的监控、日志的记录与查询、规则管控和入侵检测等功能。对记录的日志能按设置的时间段进行查询。规则管控实现了对应用层和核心层规则的设置,即对访问网络的应用程序或IP包采取放行或拒绝的动作。在状态监控中,不仅实现了将封包信息显示到列表框,还更直观地用波形曲线显示网络进出数据流量。基于端口的入侵检测,作为防火墙功能的完善和增强,能很好地检测出扫描本机端口的入侵者信息。    内容来自think58

[来源:http://think58.com]

 

think58好,好think58

[版权所有:http://think58.com]

[资料来源:http://THINK58.com]

关键词:防火墙,服务提供者接口, NDIS中间驱动,入侵检测 [来源:http://think58.com]

  [资料来源:THINK58.com]


 
[来源:http://www.think58.com]

Abstract

With the rapid development of Internet, many enterprise users and single users connect to it. People enjoy the convenience and great efficiency brought by the Internet, at the same time, their computers are continually suffered from many kinds of computer virus and hackers’ attack. One of the effectual and important solutions for network security is to set firewall. Now there are many firewalls for enterprise, but there are few firewalls for personal computer. Being based upon this situation, a firewall of personal computer working on Windows operating system is designed and implemented. think58好,好think58

[来源:http://think58.com]

This paper first discusses the background of firewall, including the basic notion of firewall and the development of firewall technology. Then it specifies the main technologies to design   the personal firewall, such as TCP/IP, Winsock2 Service Provider Interface, Network Driver In-terface Specification and intrusion detection. At that basis, taking my personal firewall called PFWall as an example, I show the whole steps of developing the personal firewall, from functi-on analyzing, module design, interface design, file structure design, to the realization of the sof-tware system. [版权所有:http://think58.com]

Key Words:Firewall, Service Provider Interface, NDIS IMD, Intrusion Detection [资料来源:THINK58.com]

 

[资料来源:www.THINK58.com]


Personal firewall, PFWall, adopts the dual packet-filtering technology by combining Wins-ock2 SPI technology with NDIS IMD technology, which implements some functions, such as monitoring the network status, recording and querying the logs, managing and controlling the rules and detecting the intrusions. The logs recorded could be queried by a period of time you set. The control of rules realizes the configuration to the rules of the application layer and the kernel layer. Namely, the firewall could show green light or red light to the applications acc-essing network or IP packets. The monitor to status not only shows the information of packet in the list box, but also intuitively shows the flux of entering or exiting data with wavy curve. As perfection to the function of firewall, the intrusion detection based ports, could detect the information of intruders who scan your system ports. [资料来源:http://THINK58.com]

  think58.com

[资料来源:http://www.THINK58.com]

  think58

[资料来源:http://www.THINK58.com]

  内容来自think58 [资料来源:http://think58.com]

目  录

think58

[来源:http://think58.com]

[资料来源:www.THINK58.com]

摘  要 1 think58.com

[来源:http://www.think58.com]

Abstract   2 think58

[来源:http://think58.com]

引  言 3 think58 [资料来源:http://THINK58.com]

1防火墙概述   4 本文来自think58

[来源:http://www.think58.com]

1.1什么是防火墙     4 think58好,好think58

[资料来源:http://www.THINK58.com]

1.1.1防火墙的定义  4

think58.com

[资料来源:http://THINK58.com]

[资料来源:http://think58.com]

1.1.2防火墙的分类  5 内容来自think58 [来源:http://www.think58.com]

1.2防火墙发展简介 5 think58.com

[资料来源:http://www.THINK58.com]

1.2.1防火墙技术的发展现状    5 copyright think58 [来源:http://www.think58.com]

1.2.2防火墙技术的发展趋势    6 [资料来源:http://think58.com]

1.3 个人防火墙的研究意义      7

[资料来源:THINK58.com]

2主要技术简介        8 think58好,好think58

[资料来源:http://THINK58.com]

2.1 TCP/IP协议族概述     8 本文来自think58

[资料来源:www.THINK58.com]

2.2 Winsock2 SPI技术      9

copyright think58

[资料来源:THINK58.com]

[资料来源:http://THINK58.com]

2.3 NDIS中间驱动技术    11

内容来自think58 [资料来源:http://think58.com]

[来源:http://www.think58.com]

2.3.1 设备驱动程序基础  11 think58.com

[版权所有:http://think58.com]

2.3.2  NDIS简述      14

内容来自think58

[资料来源:THINK58.com]

[版权所有:http://think58.com]

2.3.3 中间层驱动程序分析       15

think58

[资料来源:http://think58.com]

[资料来源:http://think58.com]

2.4 入侵检测技术    16 think58.com [资料来源:http://think58.com]

3 个人防火墙系统设计    18 本文来自think58

[来源:http://www.think58.com]

3.1功能需求分析     18

think58好,好think58 [资料来源:www.THINK58.com]

[资料来源:http://THINK58.com]

3.2 总体结构设计    19 think58好,好think58 [资料来源:www.THINK58.com]

3.3 模块结构设计    20 copyright think58 [资料来源:http://think58.com]

3.4 系统界面设计    21

[版权所有:http://think58.com]

3.5 文件结构设计    26

copyright think58

[来源:http://www.think58.com]

[来源:http://www.think58.com]

4 个人防火墙的具体实现         28

内容来自think58 [来源:http://think58.com]

[资料来源:http://www.THINK58.com]

4.1 编程环境和编码规则 28 内容来自think58

[来源:http://www.think58.com]

4.2 PFWallLSP.dll的具体实现   29 [资料来源:http://THINK58.com]

4.2.1 HOOK基于WINSOCK的调用         29

[资料来源:THINK58.com]

4.2.2 实现会话的构造      32

copyright think58 [来源:http://www.think58.com]

[版权所有:http://think58.com]

4.2.3 DLL模块与主模块的通信         33 copyright think58

[资料来源:http://THINK58.com]

4.3 PFWall.sys的具体实现       36 copyright think58 [版权所有:http://think58.com]

4.3.1 捕获原始封包 36 本文来自think58 [资料来源:http://think58.com]

4.3.2 应用程序与驱动程序通信        38

think58好,好think58

[版权所有:http://think58.com]

[版权所有:http://think58.com]

4.3.3驱动程序通知应用程序收取封包     40

think58.com

[资料来源:www.THINK58.com]

[来源:http://www.think58.com]

4.4 基于端口的入侵检测的实现      41 think58.com

[资料来源:http://THINK58.com]

4.4.1 数据结构的定义      42

think58.com [资料来源:http://think58.com]

[资料来源:http://THINK58.com]

4.4.2 入侵检测的核心代码       43 内容来自think58

[资料来源:http://THINK58.com]

5 系统测试       45 think58

[资料来源:http://THINK58.com]

结  论 46

[来源:http://think58.com]

参 考 文 献     47 think58.com [资料来源:http://think58.com]

附 录1 英文文献(原文)      48

think58

[资料来源:http://think58.com]

[来源:http://think58.com]

附 录2 英文文献(译文)      52 think58好,好think58 [版权所有:http://think58.com]

致  谢 56

think58.com

[资料来源:http://think58.com]

[资料来源:http://www.THINK58.com]

 

[资料来源:http://THINK58.com]