期刊文献+

DNS在网络中的应用 被引量:1

DNS Application in the Network
下载PDF
导出
摘要 当我们把众多的计算机联结到一起,那么如何标识网络中的每一个主机呢。Internet中使用IP地址来标识每一台主机,但却很难记忆。为了解决这种状况,便引出了DNS。本文就DNS如何将IP地址转换为域名地址作了简单的论述。 When we take a lot of computers linkup together, how can we take a computer from others. Using IP to mark per one computer in Internet,but very difficult to remember the IP. DNS resolved this situation. How DNS changes IP address to domain name address has done simple discussion in this paper.
作者 李雅丽 李然 LI Ya-li,LI Ran (Computer Department,Shijiazhuang Information Engineering Vocational College,Shijiazhuang 050035,China)
出处 《电脑知识与技术》 2007年第5期684-685,共2页 Computer Knowledge and Technology
关键词 DNS IP 域名 客户机 服务器 DNS IP domain name client server
  • 相关文献

参考文献7

二级参考文献35

  • 1[1]Allen J et al.State of the Practice of Intrusion Detection Technologies[R].TECHNICAL REPORT,CMU/SEI-99-TR-028,Carnegie Mellon University, Software Engineering Institute, 2000
  • 2[2]Ptacek T H,Newsham T N.Insertion,Evasion,and Denial of Service:EludingNetwork Intrusion Detection.http:∥www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html , 1998
  • 3[3]Brian Caswell.snort.http:∥www.snort.org/
  • 4[4]ISS Company. RealSecure Network Protection.http:∥www.iss.net/products_services/enterprise_protection/rsnetwork/index.php
  • 5[5]Ilgun K,Kemmerer R A,Porras P A.State transition a.nalysis:A rulebased intrusion detection approach[J].Software Engineering,IEEE Transactions on, 1995; 21 (3): 181 ~ 199
  • 6[6]Vigna G,Kemmerer R A.NetSTAT:A Network-based Intrusion Detection Approach[C].In:Proceedings of the 14th Annual Computer Security Applications Conference(ACSAC), 1998
  • 7[7]Alec Yasinsac. An Environment for Security Protocol Intrusion Detection[J].Journal of Computer Security,2002; (10): 177~188
  • 8[8]Shan Zheng,Chen Peng,Xu Ying et al.A network state based intrusion detection model. Computer Networks and Mobile[C].In:Computing,2001.Proceedings.2001 International Conference on,2001:481~486
  • 9[9]Karen Kent Frederick. Network Intrusion Detection Signatures,Part 5.http:∥online.securityfocus.com/infocus/1569,2002
  • 10[10]Stevens W R.TCP/IP Illustrated,Volume 1 :The Protocols[M].Addison Wesley, 1994

共引文献83

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部