cloudbaby 发表于 2005-4-27 01:57:28
由于篇幅有限,我不能将整个文章都发表上来谁喜欢看那就看一下但是我可能因为论坛的限制问题把文件能带上来多少我不清楚我的文件比较大大概在600K左右压了也在300多K所以那我只能把目录发上来大家喜欢的话留言并留下EMAIL或者和站长沟通一下将我的上传限制放开我可以把文章提供给大家下载!在有那因为文章中第五章是全文的关键核心技术顾不能完全发表谢谢大家支持,有需要的那!或者敢兴趣的那!请和我联系后在行商议!谢谢 QQ:9213831 EMAIL:ex1212@eyou.com Linux 防火墙发展与技术研究 ―――――基本应用与抗DDOS篇 赵洪宇 2005-4-24目录第1章绪论,............................................................................................ .... 11.1问题的提出................................................................................. ........... 11.2研究背景...............................................................................................21.3论文的工作................................................... .......... .................... 2第2章防火墙..................................................................................... .........42.1防火墙的一般原理.......................................................... .........42.2防火墙的功能................................................................ ................52.3防火墙的分类..................................................................... .........52.3.1 IP级防火墙............................................................................................62.3.2应用级防火墙..........:............................................... .............................62.4防火墙体系结构............................................................................62.5防火墙产品和技术发展方向............................................................................72.5.1防火墙产品的发展.................................................................................72.5.2防火墙技术发展方向..............................................................................9第3章Linux2.4版内核的防火墙...........................................................................103.1 Linux2.4内核概述............................................................. ........103.2 Linux内核编译.............................................................................113.2.1编译准备.................................................. ............................113.2.2开始编译内核................................................................... ..................... 123.3 Linux2.4内核防火墙机制................................................................ 133.4 netfilter的原理及实现…...................................................... ............. 163.5基于netfilter的二次开发................................................. ..........213.6 netfilter二次开发的示例..... ...................................................... .....22第4章防火墙的设计与实现............... .. .............................................. .....244.1防火墙总体设计....................................................................... .........244.2 kylix简介.................. .......... .......... .......... .......... .......... .......... ..254.3网络扫描防御的实现...............................:................ .......... .......... .... 264.4包过滤的设计与实现............................................................. ..........284.4.1分组包过滤的基本原理............................................................................ 284.4.2分组过滤规则的设定...................................................... .......... ...314.4.3分组过滤算法............................ .......... .......... .......... ..... .......... ..........314.4.4几种防火墙技术的实现.......... ...................................................... ........... 324.5网络地址转换(NAT). ....................................................................... .......... 374.5.1 NAT原理.......... .......... .......... .................... .......... .......... 374.5.2网络地址转换(NAT)实现................................................... ...384.6路由记录模块设计和实现................................................... .......... ......... 394.6.1路由记录基本原理........................................................... .......... ............ 394.6.2路由记录的设计总体思想.......... .......... ..... 404.6.3路由记录具体实现过程............................. 414.6.4路由记录存在的问题........................................ .......... .............. 424.7透明代理的实现.......... .......... .......... .......... .......... .......... .......... ........ 424.7.1 Squid介绍............... ............... ............... ............... .............434.7.2透明代理的工作过程.............................................. ............... ............. 434.8操作系统的加固........................................................ ............... ......... 454.9linux2.4.20内核防火墙设计思路......... 45第5章深入浅出DDOS..............................................................................第6章防火墙测试................................................... ............... ....... 47 6.1建立测试准则....................................................... ............... ................ 47 6.2搭建测试环境............... ............... ............... ............... ..47 6.3确定测试项目............... 48 6.4结论..... ............... ............50结论......................................................... ............... ............... . 51参考文献.................................................. ............... ... ............... ...............54xrouter 发表于 2005-4-27 16:13:42
给我发一个吧,呵呵netivy@eyou.comDreamCat 发表于 2005-4-27 20:35:33
作成PDF文档吧,最好是有书签的那种,看着方便。我机器上没WORD,没法转。cloudbaby 发表于 2005-4-28 03:33:13
应大家要求我已经将文件转换成PDF格式,请大家下载把嘿嘿samhui 发表于 2005-5-4 00:02:03
pysam@tom.com谢谢!dccall 发表于 2005-5-25 19:16:13
fjscl@tom.com 谢谢henrt 发表于 2005-5-28 11:03:04
麻烦也给我发个吧,谢谢henleyhe@hotmail.comchatbug 发表于 2005-5-28 22:20:23
还有我 chatbug@21cn.compc100 发表于 2005-6-2 13:51:41
edp_bill@newhonest.com流氓书生 发表于 2005-6-2 18:31:55
麻烦也给我发个吧,谢谢toughie1978@21cn.comycfei 发表于 2005-6-10 04:29:36
举手之劳啊..ycfei@163.comxiexie 发表于 2005-6-10 14:40:30
辛苦了。liujiang23@163.com小陆同志 发表于 2005-7-28 06:44:12
我也要一份,谢谢您!lu_yicheng@163.com
monkeyem 发表于 2005-8-8 10:49:30
非常渴望,请给我也来一个吧,谢谢!monkeyem 发表于 2005-8-8 10:51:34
不好意思,一时激动忘打地址了。qqgdq@163.com 再次感谢!!!