期刊文献+

入侵防护技术综述 被引量:3

An Overview of Intrusion Prevention Technique
下载PDF
导出
摘要 随着 Internet 高速发展和普及,网络安全问题日益突出,虽然传统的安全防御技术(如防火墙、入侵检洲技术等)在 某种程度上对防止系统和网络的非法入侵起到一定的作用,但由于这些安全技术自身存在先天的缺点,以及对日新月异的网络 攻击手法缺乏主动响应。在广大计算机学者的研究和不断探索下。入侵防护来统作为一个新型、动态的安全防护系统诞生了。本 文对 IPS 这种动态安全技术进行分析和研究。 With the high speed development of the Internet,network security is increasingly outstanding.Although traditional safety defense technique(such as firewall,IDS etc.)can,to a certain extent,protect the system and network from illegal intrusion,these security techniques have congenital weakness,and are inefficient to the various network attacks.Through continuous investigation of many computer researchers,the intrusion protection system was born and used as a new dynamic security system.This paper provides analysis of and study on this kind of dynamic technique-Intrusion Prevention System (IPS).
作者 胡征兵 苏军
出处 《微型电脑应用》 2005年第11期56-58,6,共3页 Microcomputer Applications
关键词 入侵检测 入侵防护 网络安全 Intrusion Detection Intrusion Prevention System Network Security
  • 相关文献

参考文献1

二级参考文献9

  • 1[1]Intrusion Prevention Systems:the Next Step in the Evolution of IDS by Neil Desai last updated Feb 27,2003.
  • 2[2]"The Evolution of Intrusion Detection Systems" by Paul Innella,Tetrad Digital Integrity,LLC last updated November 16,2001.
  • 3[3]Allen,J.,Christie,A.,Fithen,W.,McHugh,J.,Pickel,J.,and,Stoner,E.,State of the Practice of Intrusion Detection Technologies.CMU/SEI-99-TR-028,Carnegie Mellon University,Software Engineering Institute,January 2000.
  • 4[4]Marks,Crosby,former Haystack Project team member and Haystack Labs employee,telephone interview,September 3,2001.
  • 5[5]Mchugh,J,et al."Intrusion Detection:Implementation and Operational Issues," Software Engineering Institute Computer Emergency Response Team White Paper,January 2001.
  • 6[6]Power,Richard,"1999CSI/FBI Computer Crime and Security Survey," Computer Security Journal,Volume XV,Number 2,1999,pp.32.
  • 7[7]Proctor,Paul,The Practical Intrusion Detection Handbook,Prentice Hall,2001.
  • 8[8]Sans Institute,"Intrusion Detection and Vulnerability Testing Tools:What Works"Feb 2001.
  • 9[9]Shipley,Greg,"Watching the Watchers:Intrusion Detection,"Network Computing,November 13,2000.

共引文献4

同被引文献8

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部