期刊文献+

主动入侵防御系统研究 被引量:3

Research on Active Intrusion Prevention System
下载PDF
导出
摘要 针对目前日益严重的网络安全问题,提出了一套更加有效、更加完善的主动入侵防御解决方案,该方案有机结合了多种安全技术,以主机/服务器上的关键资源为中心实施纵深防御。不管攻击者采用什么样的攻击方法,总是能够主动识别攻击者的企图,对于不合适的访问或操作予以拒绝。本防御系统对驻留在主机和服务器上的数据等关键资源能起到非常有效的保护作用,可广泛应用于政府、公安、金融、电信、IT等各个行业和领域。 Presently, aiming at the increasingly serious network security, the paper proposes a set of more efficient and perfect method of active intrusion prevention. This method organically joins various security techniques, and put deep defense in practice with the key resources on the host/ server for center. Whatever ways the attackers adopt, our system always can actively identify their attack attempts and refuses improper accesses or operations. The prevention system may highly effectively protect the resources residing in the hosts and servers, so it can widely apply to various industries and fields such as government, police,finance, telecom and IT etc.
出处 《微计算机应用》 2005年第3期269-273,共5页 Microcomputer Applications
关键词 入侵防御 系统研究 网络安全问题 关键资源 解决方案 安全技术 有机结合 纵深防御 攻击方法 保护作用 防御系统 服务器 攻击者 主机 数据 驻留 Active intrusion prevention system, Access control, Intrusion Detection, Drivers,System call, Identity Authentication
  • 相关文献

参考文献5

  • 1高岩,蒋若江.主机防护系统中系统调用截获机制的实现[J].计算机工程与设计,2003,24(11):76-80. 被引量:15
  • 2蒋东兴,徐时新,李志.主机网络安全初探[J].小型微型计算机系统,2000,21(7):764-766. 被引量:13
  • 3Przemyslaw Kazienko, Piotr Dorosz. Intrusion Detection Systems. http://www. windowsecurity. com/articles_tutorials/intrusion_detection/
  • 4Prasad Kabak, Sandeep Phadke, Milind Borate. Undocumented Windows NT. John Wiley&Sons, 1999.
  • 5David A Solomon, Mark E Russinovich. Inside Microsoft Windows 2000, Third edition. Microsoft Press, 2000.

二级参考文献11

  • 1Prasad Dabak, Sandeep Phadke, Milind Borate. Undocumented windows NT[M]. John Wiley & Sons, 1999.
  • 2David A Solomon, Mark E Russinovich. Inside microsoft Windows 2000,Third edition[M]. Microsoft Press, 2000.
  • 3Gary Nebbet. Windows NT/2000 native API reference[M].Que. 1 st edition, 2000.
  • 4Dmitri Leman.Tracing NT kemel-mode calls[EB/OL], WDJ,2000, (4). http://www.wdj.com/articles/2000/00E04/0004b/0004b.htm? topic=articles.
  • 5Mark Russinovich, Bryce Cogswell. Windows NT systemcall hooking[J]. Dobbs Journal, 1997,(1).
  • 6James Finnegan. Windows NT process monitoring[D]. MS J,1999.
  • 7Galen Hunt, Doug Brubacher. Detours: Binary Interception of Win32 functions [C]. Proceedings of the 3rd USENIX Windows NT Symposium. Seattle, WA, 1999.
  • 8Yona Hollander, Romain Agostini. Stop hacker attacks at theOS level [EB/OL], Intemet Security Advisor Magazine,2000, (9/10). http://www.entercept.com/products/entercept/news/intsecadvmag.pdf.
  • 9Sekar R, Bowen T, Segal M. On preventing intrusions by process behavior monitoring [C]. Usenix Intrusion Detection Workshop, 1999.
  • 10Prasad Dabak, Milind Borate, Sandeep Phadke. Hooking windows nt system services[M]. M&T Books, 1999.

共引文献26

同被引文献5

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部