Acta Metallurgica Sinica(English letters) ›› 2007, Vol. 14 ›› Issue (1): 39-44.doi: 1005-8885 (2007) 01-0039-06

• Wireless • Previous Articles     Next Articles

Design and analysis of firewall-penetrated scheme based on trusted host

ZHANG Deng-yin, WANG Qian-qian, XU Jian   

  1. Computer Institute, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • Received:2006-10-12 Revised:1900-01-01 Online:2007-03-30
  • Contact: ZHANG Deng-yin

Abstract:

On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication between penetrating host and protected host, is proposed in this paper. Meanwhile, the firewall-penetrated evaluating model and its formalized statement is also proposed by quantizing penetrated level, penetrated quality, and penetrated hiding. Finally, the firewall-penetrated technology based on trusted host is analyzed under the firewall-penetrated evaluating model, and the experimental results show that this technology has obvious penetrating effect and high penetrating quality.

Key words:

firewall-penetrated;trusted host (TH);penetrated host;penetrated evaluating model

CLC Number: