期刊文献+

Syslog协议的安全漏洞 被引量:1

The Security failings in Syslog protocol
下载PDF
导出
摘要 Syslog协议有着非常优秀的网络日志管理机制,提供了网络日志的存储方法和传输通道。但是该协议在网络信息安全方面存在着缺乏数据加密、传输加密与认证等多个漏洞,若不加改进地直接应用可能会导致非常严重的安全问题。本文将对这些漏洞进行详细的分析与阐述。 Syslog protocol is a very excellent management mechanism in network, it afford the storage method and the transport channels of network logs. But there are some security failings in Syslog protocol, such as data encryption, transport encryption and authenticity, etc. It will induce some very serious security problems if Syslog protocol been used without any improved. This paper will analyze and expatiate on these failings particularly.
作者 黄文
出处 《湖南科技学院学报》 2005年第5期127-128,共2页 Journal of Hunan University of Science and Engineering
关键词 加密认证 安全漏洞 日志文件 Syslog协议 存储方法 传输通道 数据加密 网络日志管理 Encryption and Authenticity Security Failings Log Files Syslog Protocol
  • 相关文献

参考文献5

  • 1Computer Emergency Response Team. Manage Logging and Other Data Collection Mechanisms[EB/OL].http//www.cert.org/security improvement/practices/p092.html,2001-05-01.
  • 2[10]Richard Murphy,L. Syslog and Netsaint:How to Integrate Centralized Logging with Centralized Monitoring.http//www. sans.org/infosecFAQ/security/logging.htm,2001-7-27.
  • 3Kenneth E. Nawyn,L. A Security Analysis of System Event Logging with Syslog. www.sans.org/infosecFAQ/securitybasics,2003-05-28.
  • 4白跃彬,刘轶,郑守淇,侯宗浩.远程访问安全认证方案的设计与分析[J].西安交通大学学报,2001,35(8):829-833. 被引量:5
  • 5http://www.microsoft. com/windows2000/library/planning/security

二级参考文献6

  • 1[1]Prabhu M M, Raghavan S V. Security in computer networks and distributed systems [J].Computer Communications,1996,19(4):378~388.
  • 2[2]Fisch E A, White G B. Secure computers and networks-analysis, design and implementation[M].New York:CRC Press,2000.
  • 3[3]Stallings W. Network and internetwork security: principles and practice[M].New York:Prentice-Hall Inc,1996.
  • 4[4]Touch J D.Performance analysis of MD5 [J].ACM Computer Communication Review,1995,25(4):77~86.
  • 5[5]Bellare M, Canetti R, Krawczyk H. Keying Hash functions for message authentication[A].Lecture Notes in Computer Science: Advances in Crytology-CRYPTO'96 [C].Berlin:Springer,1996.1~15.
  • 6[6]Preneel B,Van O. MD-x MAC and building fast MACs from Hash functions [A]. Lecture Notes in Computer Science : Advances in Cryptology-CRYPTO'95 [C].Berlin : Springer,1995.53~56.

共引文献4

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部