期刊文献+

一个网络信息内容安全的新领域——网络信息渗透检测技术 被引量:12

A new field in security of internet information and content ——network information penetration detection technology
下载PDF
导出
摘要 提出了一个新的网络与信息安全领域的应用技术:网络信息渗透检测技术,适用于国际反恐、应急处理等方面的技术分析。文中研究并给出了信息渗透及检测技术的研究模型和总体框架,提出了总体解决思路,对网络信息渗透技术进行了抽象研究,划分了三类通道,提出了采用降级方式分别对三类通道进行处理的策略,并用未知通信协议的分析对综合集成方法进行了验证。 This paper presents a new technology of Internet information and content security, network information penetration detection technology (NIPT), which applies to analysis support of international anti-terrorism and emergency response. The frame, study model and the solution of NIPT are given in the article. The author give a abstract study on NIPT and divide it into three kinds of channels and propose a policy of degrading which used to treat the three channels. And we testify the Metasynthesis method, which is proposed by QIAN Xue-sen, by analyzing an unknown communication protocol.
出处 《通信学报》 EI CSCD 北大核心 2004年第7期185-191,共7页 Journal on Communications
基金 国家"863"基金资助项目(2002AA147020)
关键词 信息安全 网络信息渗透检测技术 开放的复杂巨系统 METASYNTHESIS 降级分析 information security NIPT open huge complex systems metasynthesis degrading analysis
  • 相关文献

参考文献8

  • 1HANDLEY M, PAXSON V, KREIBICH C. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics[A]. Proceedings of the 10th USENIX Security Symposium[C]. Washington D C, 2001. 159-167.
  • 2MAHONEY M, CHAN P. Detecting Novel Attacks by Identifying Anomalous Network Packet Headers[R]. Technical Report CS-2001-2, Florida Institute of Technology, 2001.
  • 3BETTATI R, ZHAO W, TEODOR D. Real-time intrusion detection and suppression[A]. Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring[C]. Santa Clara, CA, April 1999.
  • 4COHEN W. Fast effective rule induction[A]. Proceedings of the Twelfth International Conference on Machine Learning[C]. Lake Tahoe, CA, 1995. 115-123.
  • 5LIPPMANN R, et al. The 1999 DARPA Off-Line Intrusion Detection Evaluation[M]. Draft of Paper Submitted to Computer Networks, 2000. 1-20.
  • 6ALLEN J, CHRISTIE A, FITHEN W, et al. State of the Practice of Intrusion Detection Technologies[R]. Carnegie Mellon University/Software Engineering Institute Technical Report CMU/SEI-99-TR-028, Jan 2000.
  • 7钱学森,于景元,戴汝为.一个科学新领域——开放的复杂巨系统及其方法论[J].自然杂志,1990,13(1):3-10. 被引量:1290
  • 8戴汝为,操龙兵.Internet——一个开放的复杂巨系统[J].中国科学(E辑),2003,33(4):289-296. 被引量:56

二级参考文献6

共引文献1324

同被引文献104

引证文献12

二级引证文献189

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部