期刊文献+

基于IP技术的网络安全体系设计 被引量:1

Designing Network Security System Based on IP Technology
原文传递
导出
摘要 计算机网络的飞速发展以及在各个领域的广泛应用,使得网络的安全性问题越来越为人们所关注。然而,网络系统安全问题不仅仅是技术的问题,而是安全策略、安全技术与安全管理的综合过程,是一项系统工程。 With the rapid development and wide use of computer network, the security issue concerning network has drawn people's attention. However, network security is not only a technical problem but also a comprehensive systems engineering of security strategy, security technology and security management.
作者 林永和
出处 《政法学刊》 2005年第4期106-108,共3页 Journal of Political Science and Law
关键词 网络安全 安全体系 安全设计 IP network security, security system, security design, IP
  • 相关文献

参考文献2

二级参考文献11

  • 1[1]Check Point Software Technologies Ltd., "OPSEC Integration Overview", http://www. checkpoint. com/.
  • 2[2]Check Point Software Technologies Ltd., "Introduction to OPSEC", http://www. checkpoint. com/.
  • 3[3]Steve Lodin, "Intrusion Detection Product Evaluation Criteria",http://www.denmac.com.
  • 4[4]T Ptacek and T.Newsham, "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection",http://www.sort. org.
  • 5[3]Lippmann R;Cunningham R. Improving intrusion detection performance using keyword selection and neural network[C]. Proceedings. RAID'99,1999
  • 6[4]Lee, S.C.; Heinbuch, D.V. Training a neural-network based intrusion detector to recognize novel attacks[J]. IEEE Transactions on Systems, Man and Cybernetics, Part A, Volume: 31 Issue: 4 , July 2001, pp 294 -299
  • 7[5]J Balasubramaniyan, J Omar Garcia-Fernandez, D Isacoff, E Spafford, D Zamboni. An architecture for intrusion detection using autonomous agents[C].Proceedings of the 14th Computer Security Applications Conference, 1998. pp 13-24
  • 8[6]Frincke D, Don Tobin, Jesse McConnell et al. A framework for cooperative intrusion detection[C]. Proceedings of the 21st National Information Systems Security Conference, 1998, pp 361-373
  • 9[7]Jungwon Kim; Bentley, P.J. Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator[C] .Proceedings of the 2001 Congress on Evolutionary Computation. Volume: 2 , 2001, pp1244 -1252
  • 10蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370

共引文献37

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部