期刊文献+

陷阱系统的研究与设计 被引量:2

The Research and Design of the Snare System
下载PDF
导出
摘要 互联网的广泛应用使信息资源的作用得到了极其充分的发挥,同时导致了众多不安全因素的介入。已在网络中普遍应用的防火墙和入侵检测系统这两种防护手段,虽然取得了很好的安全防护效果,但还存在发现和预防的能力不够,不能确切知道或预测入侵者的攻击目标或手段等不足。而陷阱系统的应用能弥补这些不足,增强网络的安全性。 The widespread use of Internet has enabled the greatest use of information resources,but it also incurs various insecure factors.Although the popular application of firewall technology and IDS has achieved very good effort for defense,it still lacks a lot in finding and preventing the attackers,unable to forecast the aim and means of attackers.But the Snare System can do well in these aspects.
作者 詹珽
出处 《贵州工业大学学报(自然科学版)》 CAS 2004年第6期53-56,共4页 Journal of Guizhou University of Technology(Natural Science Edition)
关键词 陷阱技术 蜜罐(honeypot)技术 蜜网(honeynet)工程 陷阱系统 the Snare Technology honeypot honeynet the Snare System of Snare
  • 相关文献

参考文献2

  • 1[1]Gary R.Wright,W.Richard Stevens著,陆雪莹等译.tcp/ip详解第二卷[M].北京:机械工业出版社,2000.
  • 2[5]杨学良,等.UNIX SYSTEM V内核剖析[M].北京:电子工业出版社,1990.

同被引文献9

  • 1John Levine,Richard LaBella.The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks[C] //Proceedings of the 2003 IEEE.Workshop on Information Assurance.United State American:United State Military Academy,2003.
  • 2Sven Kra88er,Julian B Grizzard,Henry L Owen.The Use of Honeynets to Increase Computer Network Security and User Awareness[J].Journal of Security Education,2005.
  • 3Spitzner L.Honeypot Farms[EB/OL].[2003-08-13].http://www.securityfocus.com/infocus/1720.
  • 4Spitzner L.Honeypots:Catching the Insider Threat[c].Proceedings of the 19th Annual Computer Security Applications Conference,Las Vegas,Nevada,USA,2003-12-08.
  • 5John Levine,Richard LaBella.The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks[A].In:Proceedings of the 2003 IEEE.Workshop on Information Assurance[C].United State American:United State Military Academy,2003.
  • 6Sven Krasser,Julian B.Grizzard,Henry L.Owen.The Use of Honeynets to Increase Computer Network Security and User Awareness[J].Journal of Security Education,2005.
  • 7Spitzner L.Honeypot Farms[EB/OL].[2003-08-13].http://www.securityfocus.com/infocus/1720.
  • 8Spitzner L.Honeypots:Catching the Insider Threat[EB/OL].:Proceedings of the 19th Annual Computer Security Applications Conference,Las Vegas,Nevada,USA,2003-12-08.
  • 9张震.入侵诱骗模型的建立方案[J].系统工程与电子技术,2004,26(4):433-436. 被引量:8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部