期刊文献+

计算机局域网主动防御体系的研究 被引量:1

Study of the Active Defense System in Computer local Area Network
原文传递
导出
摘要 本文通过对计算机局域网主动防御体系的论述,给出了一种计算机局域网防御攻击模型。该模型描述了计算机局域网主动防御以及主动防御体系的含义、构成以及实现技术和安全分析。该模型采用分布式结构,将动态安全体系模型应用到各个安全系统,而各安全系统通过安全消息协议共享安全消息,从而实现具有防御纵深的、梯次部署的主动防御体系。 By disserting an active defense system in computer local area network,this article gives a model of defending attack in computer local area network.This model gives a definition,constituent,how to realize and security analyze of the active defense and the active defense system in computer local area network.Adopting a distribute structure,this model uses dynamic security system models in all security system,rid each security system share the safe message by the safe message protocol,then realize an active defense system which is a depth defense system and has a hierarchical structure.
出处 《网络安全技术与应用》 2006年第11期18-19,23,共3页 Network Security Technology & Application
关键词 计算机局域网 主动防御体系 计算机网络安全 computer local area network active defense system computer network security
  • 相关文献

参考文献4

二级参考文献11

  • 1卢英佳,卿斯汉.网络漏洞扫描技术[J].桂林电子工业学院学报,2004,24(3):32-36. 被引量:7
  • 2IATF Document 3. 1. http://www. iatf. net/framework_docs/version-3_1/ index. cfm, 2003-03-20.
  • 3COHEN F. A note on the role of deception in information protection [EB/OL]. http ://all. net/journal/deception/deception. html. 2001-12-29.
  • 4COHEN F. A framework for deception [EB/OL].http://all. net/journal/deception/Framework/Framework. html. 2001-12-29.
  • 5COHEN F. A mathematical structure of simple defensive network deceptions [EB/OL]. http : //all. net /journal/deception/mathdeception/mathdeception.html. 2001-12-29.
  • 6Rao N S V, Bang Y C, Sridhar Radhakrishnan, et al. NetLets: measurement-based routing daemons for low end-to-end delays over networks[J]. Computer Communicaitions, 2003, 26(8): 834-844.
  • 7Nessett D M. Factors affecting distributed system security[J]. IEEE Transactions on Software Engineering, 1987, 13(2): 233-248.
  • 8Paxsion V. End to end routing behavior in the Internet[J]. IEEE/ACM Trans on Networking, 1997, 5(5): 601-615.
  • 9段海新,吴建平.计算机网络的一种实体安全体系结构[J].计算机学报,2001,24(8):853-859. 被引量:28
  • 10钱桂琼,杨泽明,许榕生.计算机取证的研究与设计[J].计算机工程,2002,28(6):56-58. 被引量:55

共引文献26

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部