期刊文献+

计算机网络黑客及其入侵检测系统探析 被引量:1

Techniques of Hackers and IDS Computer Networks
下载PDF
导出
摘要 本文阐述了计算机网络黑客的概念,简单分析黑客是如何入侵计算机系统的,并介绍入侵检测系统(IDS),包括入侵检测的概念、原理、主要构成、入侵检测的内容、当IDS检测到一个入侵行为后所采取的行动、IDS系统应该安放到网络的部位、以及IDS与网络中其他安全措施的配合。 After introducing the definition of ' Hackers' ,and analyzing how hackers freak into computer system. It describes Intrusion Detecting System(IDS), including the concept,principle,main structure and the content of IDS,the action taken when IDS detects any intrusion,the position when IDS should be placed and the cooperation between IDS and other security methods in network.
作者 梁丽明
出处 《机电工程技术》 2004年第8期25-26,48,共3页 Mechanical & Electrical Engineering Technology
关键词 黑客 校园网 黑客入侵 入侵检测系统 Hacker,Intrusion of hacker,Network security,Intrusion Detecting System
  • 相关文献

参考文献3

二级参考文献9

  • 1Stevens W R. Unix Network Programming Networking APIs:Sockets and XTI[ M]. Prentice Hall PTR.
  • 2M Satyanarayananan,J J Kistler,P Kumar,et al. Coda: A Highly Available File System for a Distributed Workstation [ J ]. IEEE Transactions on Computers, 1990,39(4).
  • 3Papadopoulos G A, Arbab F. Coordination Models and Languages[ M ]. Advances in Computers. Academic Press, 1998.
  • 4J Ousterhout, A Cherenson, et al.The Sprite Network Operating System[J]. IEEE Computer, 1998,21 (2) :23-36.
  • 5Marc D, Kathleen J. Recent Advances on Intrusion Detection [ Z ].IBM Zurich Research Laboratory.
  • 6Phillip A P, Alfonso V. Live Traffic Analysis of TCP/IP Gateways[Z].
  • 7Jake R, Meng-Jang L, Risto M.Intrusion Detection with Neural Networks[ R]. The University of Texas at Austin.
  • 8Guy G, Johnny S K, Vasant H, et al. Intelligent Agents for Inausion Detection [ Z]. Iowa State University.
  • 9(美)[C.布伦顿]ChrisBrenton著,马树奇,金燕.网络安全从入门到精通[M]电子工业出版社,1999.

共引文献6

同被引文献3

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部