Dissertation > Excellent graduate degree dissertation topics show

Research and Realization of Rule Management Technology Based on Large-capacity TCAM

Author: PengHongZhi
Tutor: SunZhiGang
School: National University of Defense Science and Technology
Course: Computer Science and Technology
Keywords: TCAM Large capacity TCAM rules management model HASH
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 100
Quote: 0
Read: Download Dissertation

Abstract


With the rapid development of network technology and emerging network applications are emerging , emerging network attacks has posed a serious challenge to the network security . The original firewall technology has not fully meet the needs of network security . Intrusion Detection System (IDS) is a useful complement to the firewall . IDS analysis of information collected by the computer network or computer system in a number of key points , to discover whether the network or system violation of security policy as well as the system if there are signs of attack . One of the key technologies to achieve based on quintuple real-time classification is a network intrusion detection system (NIDS) packets on the network link . TCAM has a large capacity , fast search , it is widely used in packet classification operations of NIDS . However , hundreds of thousands of rules stored in the TCAM efficient management is very difficult for the problem , the of TCAM rules management model , as well as the key technologies involved in-depth research , the main work and innovations including : 1 . Proposed and in - depth three synergistic special instructions and hardware and software -based TCAM TCAM rules management software-based image . Analysis that the smallest impact on the performance of packet classification based on the rules of the software image management method , and therefore suitable for use in high - speed link NIDS applications . 2 . Capacity TCAM rules management model based on software image . The complex problems facing the organization and management rules , the HASH table rules - based organization , static rules update , updates and rules of survival based on the virtual clock cycle management and other key technology for the in-depth study of dynamic rules , and proposed solutions . Network Interface Card (CIA) for content inspection acceleration demand of engineering capacity TCAM rules management model based on software image on 64-bit Linux operating system based on to support 64K quintuple rules of TCAM rules management module . From the above, this article from the theoretical analysis , the study and design of algorithms to achieve three aspects of system capacity TCAM rules management technology . The research not only has a theoretical value , also played an important role in the actual engineering applications .

Related Dissertations

  1. Research password authentication key agreement protocol based,TN918.1
  2. Research on the Storage of Condensed Cube Based on Flash Memory,TP333
  3. Research on the Low-cost RFID Systems Security Protocol,TP391.44
  4. Design of AHB Monitor Based on SHA and AES Algorithms,TP309.7
  5. RFID Authentication Protocol Based on Hash Function,TP391.44
  6. The Research of Transition Technology for IPv4-IPv6 Based on NAT-PT,TP393.04
  7. Research and Application of Data Storage in the WAN Optimization,TP333
  8. Cryptanalysis of the Reduced SHA-2 Algorithm,TN918.1
  9. High flow conditions P2P streaming real-time behavior recognition system design and implementation,TN919.8
  10. Deduplication technology research and implementation,TP333
  11. Hash based on structured sparse spectrum image indexing algorithm,TP391.41
  12. Semi-supervised hashing algorithm based Image Retrieval Methods,TP391.41
  13. SSD controller wear leveling algorithm,TP333.35
  14. And asymmetric VLAN 's core technology research,TP393.1
  15. Research on the Security Protocol of Air Interface for RFID System,TP391.44
  16. Wireless sensor network key management scheme,TN918.82
  17. Research on Key Update Scheme in Wireless Sensor Networks,TP212.9
  18. Two logic synthesis technology - based firewall rules to minimize research,TP393.08
  19. Cloud computing environment data self-destruct mechanism,TP393.08
  20. Research on Automated Selection of Hash-style Habitation,P283
  21. Research on TCAM Based Packed Classification,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile