Acta Metallurgica Sinica(English letters) ›› 2007, Vol. 14 ›› Issue (1): 39-44.doi: 1005-8885 (2007) 01-0039-06

• Artificial Intelligence • 上一篇    下一篇

Design and analysis of firewall-penetrated scheme based on trusted host

ZHANG Deng-yin, WANG Qian-qian, XU Jian   

  1. Computer Institute, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • 收稿日期:2006-10-12 修回日期:1900-01-01 出版日期:2007-03-30
  • 通讯作者: ZHANG Deng-yin

Design and analysis of firewall-penetrated scheme based on trusted host

ZHANG Deng-yin, WANG Qian-qian, XU Jian   

  1. Computer Institute, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • Received:2006-10-12 Revised:1900-01-01 Online:2007-03-30
  • Contact: ZHANG Deng-yin

摘要:

On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication between penetrating host and protected host, is proposed in this paper. Meanwhile, the firewall-penetrated evaluating model and its formalized statement is also proposed by quantizing penetrated level, penetrated quality, and penetrated hiding. Finally, the firewall-penetrated technology based on trusted host is analyzed under the firewall-penetrated evaluating model, and the experimental results show that this technology has obvious penetrating effect and high penetrating quality.

关键词:

firewall-penetrated,;trusted;host;(TH),;penetrated;host,;penetrated;evaluating;model

Abstract:

On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication between penetrating host and protected host, is proposed in this paper. Meanwhile, the firewall-penetrated evaluating model and its formalized statement is also proposed by quantizing penetrated level, penetrated quality, and penetrated hiding. Finally, the firewall-penetrated technology based on trusted host is analyzed under the firewall-penetrated evaluating model, and the experimental results show that this technology has obvious penetrating effect and high penetrating quality.

Key words:

firewall-penetrated;trusted host (TH);penetrated host;penetrated evaluating model

中图分类号: