期刊文献+

计算机网络安全技术的分析与研究 被引量:3

Analysis and Discussion on Computer Network Safety Technology
下载PDF
导出
摘要 随着计算机网络信息的快速发展,人们对计算机网络的依赖愈来愈大。然而计算机网络的各类犯罪也越来越严重,其安全越来越令人担心。文章在分析国内外计算机网络安全基本状况的基础上,详细地对防火墙技术、数据加密技术、入侵检测技术和防病毒技术的原理、功能和缺陷方面进行了阐述与分析,这对计算机网络安全的构建具有指导意义。 With the rapid development of the computer network information, people are becoming more and more dependent with the networks. However, crimes committed in computer networks become more and more serious. People become increasingly worried about network security. This article firstly analyses the basic situation of the network security both at home and abroad. Then the principle, Function and fault of firewall safety technology, data encryption technology, intrusion detection technology and anti-virus, technology are analyzed and presented especially. This supported method is of strong instructing function on the construction of network security.
作者 王东海
出处 《科技广场》 2005年第10期109-111,共3页 Science Mosaic
关键词 网络安全 防火墙 数据加密 入侵检测 防病毒技术 Network Security Firewall Safety Data Encryption Intrusion Detection Antivirus Technology
  • 相关文献

参考文献2

二级参考文献10

  • 1孟静.操作系统原理教程[M].北京:清华大学出版社,..
  • 2王鹏 尤晋元译.操作系统设计与实现[M].北京:电子工业出版社,..
  • 3Rebecca Bace, Peter Mell. Intrusion detection systems. NIST Special Publication on Intrusion Detection Systems, National Institute of Standards and Technology, 2000.
  • 4Martin Roesch. Snort - Lightweight intrusion detection for networks. In the Proceedings of the 13th Large Installation System Administration Conference, Seattle, Washington, USA November 1999.
  • 5Steven T Eckmann. Translating Snort rules to STATL scenarios. In Proceedings of the Fourth International Symposium on Recent Advances in Intrusion Detection October 10-12, 2001 Davis, CA, USA.
  • 6Rebecca Gurley Bace. Intrusion Detection. Macmillan Technical Publishing, U.S.A., 1999.
  • 7Department of Defense. Trusted Computer System Evaluation Criteria. Dec. 1985.
  • 8Denning D. An intrusion detection model. IEEE transaction on Software Engineering, 1987, 13(2):222-232.
  • 9Brian Caswell, Jay Beale, James C.Foster, Jeffrey Posluns. Snort 2.0 Intrusion Detection, 2004.
  • 10Wenke Lee. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems, PhD thesis, Columbia University, 1999.

共引文献14

同被引文献10

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部