期刊文献+

黑客监控系统的研究与实现 被引量:1

The Research and Implementation of Hacker Monitoring System
下载PDF
导出
摘要 论文提出了黑客监控系统的概念与模型,论述了该系统设计、实现、部署等技术细节。与单纯的入侵检测系统相比,黑客监控系统既可实现对黑客的实时监控与诱捕,又能对业务网提供可靠的主动性保护,其监控机制对内部、外部及潜在黑客同样有效,解决了入侵检测系统无法应对潜在黑客和内部攻击的问题。 This paper presents the'Hacker Monitoring System(HMS )'concept and model,and gives the descriptions of the design,implementation and deployment of HMS in detail.Compared with pure IDS,HMS in detail can not only monitor and trap hackers in real-time mode,but also provide the active and reliable defense to enterprise network.The monitoring mechanism of HMS is effective for inside,outside and potential hackers.Thus the problems which IDS can not handle the potential and inside hackers are solved.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第29期178-181,共4页 Computer Engineering and Applications
基金 国家863高技术研究发展计划项目资助(编号:2001AA142100) 国家教育部博士学科点基金资助(编号:20010699018)
关键词 黑客监控系统 入侵检测系统 黑客诱骗 Hacker Monitoring System(HMS ),Intrusion Detection System(IDS),hacker deception
  • 相关文献

参考文献5

二级参考文献22

  • 1[1]The ICAT team. ICAT Comprehensive Vulnerability Ranking System.http://icat.nist.org
  • 2[2]Mann D E,Christey S M.Towards a Common Enumeration of Vulnerabilities[C].In:Presented at 2nd Workshop on Research with Security Vulnerability Databases,Purdue University,West Lafayette, IN ,1999
  • 3[3]Baker D W,Christey S M,Hill W H et al.The Development of a Common Enumeration of Vulnerabilities and Exposures[C].In:the Second International Workshop on Recent Advances in Intrusion Detection, 1999
  • 4[4]Elz R,Bush R.Clarifications to the DNS Specification[S].RFC 2181,1997-07
  • 5[5]Mockapetris P.Domain names-concepts and facilities[S].RFC 1034,1987-11
  • 6[6]Mockapetris P.Domain names-implementation and specification[S].RFC 1035,1987-11
  • 7[1]Rumbaugh J,Jacobson I,Booch G.The Unified Modeling Language User Guide[M].Addison Wesley Longman,Inc, 1999:3~4
  • 8[2]Rumbaugh J,Jacobson I,Booeh G.The Unified Modeling LanguageReference Manual[M].Addison Wesley Longman,Inc,1999:178~180
  • 9[3]Comer D E,Stevens D L.Internetworking with TCP/IP Volume I:Principles,Protocols,and Architecture[M].Third Edition,Prentice-Hall International, Inc, 1995:150~167
  • 10[4]Comer D E,Stevens D L.Internetworking with TCP/IP Volume Ⅱ:

共引文献44

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部