期刊文献+

基于策略的入侵防御系统模型的研究 被引量:11

A Policy-based Intrusion Prevention System
下载PDF
导出
摘要 防火墙和入侵检测系统是当前广泛使用的网络安全保护设备,在预防网络攻击和入侵方面起到了至关重要的作用,但它们自身存在不可避免的缺陷降低了实际使用时提供的保护功能。因此为了进一步提高网络安全性,设计一个能够集成多种安全技术的优势同时又能弥补各自不足的新的网络安全保护技术,已经成为当前人们的追求。提出基于策略的入侵防御系统(PB-IPS)目的在于实现安全管理与网络管理系统真正的结合,以网络管理系统为中介,将防火墙技术和入侵检测技术融于一体,实现全新的网络安全保护措施。 Firewall and Intrusion Detection System can enforce security of the network effectively, but there are also drawbacks existing in themselves. To enhance the security of the network furthermore, integrating isolation function of the firewall and IDS while avoiding their limitations is a good idea. The policy-based intrusion prevention system, which integrating security management into network management system and realizing functions of firewalls and IDS through NMS, is an entirely new and effective security protection technology.
出处 《计算机应用研究》 CSCD 北大核心 2006年第3期126-127,130,共3页 Application Research of Computers
关键词 入侵防御系统 移动代理 PTSL 安全策略 IDS Mobile Agent PTSL Security Policy
  • 相关文献

参考文献7

  • 1梁琳,拾以娟,铁玲.基于策略的安全智能联动模型[J].信息安全与通信保密,2004,26(2):35-37. 被引量:3
  • 2Yao-Min Chen,Yanyan Yang.Policy Management for Network-based Intrusion Detection and Prevention[J].Network Operation and Ma-nagement Symposium,2004,(2):219-232.
  • 3L P Gaspary,L F Balbinot,L R Tarouco.Monitoring High-Layer Protocol Behavior Using the Trace Architecture[J].Network Operation and Management Symposium,2001,(1):99-110.
  • 4Definitions of Management Objects for the Delegation of Management Scripts[S].RFC3165,IETF,2001.
  • 5BrianCaswell JayBeale etal 宋敬松.Snort 2.0 Intrusion Detection [M].北京:国防工业出版社,2004..
  • 6K Llgun,R A Kemmerer,P A Porras.State Transition Analysis:A Rule-based Intrusion Detection System[J].IEEE Transactions on Software Engineering,1995,21:181-199.
  • 7Xinyou Zhang,et al.Intrusion Prevention System Design[J].Computer and Information Technology,2004:386-390.

二级参考文献4

  • 1[1]Dinesh C.Verma "Simplifying Network Administration Using Policy-baseed Management" IEEE. Computer Society 2002
  • 2[2]Morris Sloman and Emil Lupu "Security and Management Policy Specification"IEEE Network 2002
  • 3[3]Gary N.Stone.Bert Lundy.and Geoffrey G. Xie "Network Policy Languages: A Survey and a New Approach" IEEE Network 2002
  • 4[4]Tatyana Ryutov and Clifford Neuman "The Specification and Enforement of Advanced Securtiy Policies" IEEE Computer Society 2002

共引文献4

同被引文献44

引证文献11

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部