期刊文献+

即时通信的PKI保护策略研究

Study on the PKI Protective Countermeasures of Instant Messaging
下载PDF
导出
摘要 对IM的主要安全威胁进行分析,提出采用SSL对通信连接进行保护;用PKI对配置信息进行加密存储,对传输的数据进行签名,加密以及解密,验证签名等安全处理;引入签名验证机制和CAPTCHA验证机制来防范可能的蠕虫病毒攻击。通过一系列的安全保护策略,对IM实行一种全方位的保护。 Analyze the main security threat the Instant Messaging, put forward adopting Secure Socket Layer to protect secure connection. Apply the Public Key Infrastructure mechanism to protect the configuration information; use methods such as encryption, decryption, signature and verification of signature to secure the data exchange. Take precautions against the attack from worms virus by means of mechanism of digital signature and CAPTCHA validation. Practice the all - directions protection to the IM through a set of secure protection strategy.
出处 《湖南人文科技学院学报》 2007年第4期45-48,共4页 Journal of Hunan University of Humanities,Science and Technology
基金 教育部重点项目(05128)
关键词 即时通信 公共基础设施 蠕虫病毒 数字签名 CAPTCHA验证 instant messaging public key infrastructure worms virus digital signature CAPTCHA validation
  • 相关文献

参考文献7

  • 1Wikipedia.ICQ简介.http://zh.wikipedia.org/wiki/ICQ.
  • 2Rivest R L,Shamir A,Adleman L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM;1978,21(2):120-126.
  • 3AndrewNash WilliamDuane CeliaJoseph DerekBrink.公钥基础设施(PKI):实现和管理电子安全[M].北京:清华大学出版社,2002..
  • 4Schneier B.应用密码学(协议算法与C源程序)[M].吴世忠.译.北京:机械工业出版社,2003.3,40-67.
  • 5Carlisle Adams,Steve Lloyd.公开密钥基础设施-概念、标准和实施[M].北京:人民邮电出版社,2001.
  • 6Pyda Sriuresh,Bryan Ford,Dan Kegel.State of Peer-to-Peer(P2P)communication across Network Address Translators(NATs).http://www.ietf.org/interner-drafts/draft-srisuresh-behave-p2p-state-02.txt,2006-03-07.
  • 7卿斯汉,王超,何建波,李大治.即时通信蠕虫研究与发展[J].软件学报,2006,17(10):2118-2130. 被引量:17

二级参考文献40

  • 1Hindocha N, Chien E. Malicious threats and vulnerabilities in instant messaging. 2005. http://www.symantec.com/avcenter/reference/malicious.threats.instant.messaging.pdf
  • 2IMlogic Threat Center. 2005 real-time communication security: The year in review. 2005. http://www.imlogic.com/pdf/2005ThreatCenter_report.pdf
  • 3CN/CERT. CN/CERT China Network Security Research Annual Report. 2005. http://www.hais.org.cn/doc/2005CNCERTCC AnnualReport_Chinese.pdf
  • 4Nazario J, Anderson J, Wash R, Connelly C. The future of Internet worms. Blackhat Briefings, 2001. http://www.crimelabs.net/does/worm.html
  • 5Zheng H. Intemet worm research [Ph.D. Thesis]. Tianjin: Nankai University, 2003 (in Chinese with English abstract).
  • 6Messenger APIs. http://msdn.microsoft.corn/downloads/list/messengerapi.asp
  • 7ICQ APIs. http://www.icq.com/api/
  • 8W32.Choke.Worm. http://securityresponse.symantec.com/avcenter/venc/data/w32.choke.worm.html
  • 9W32.Goner.A@mm. http://securityresponse.symantec.com/avcenter/venc/data/w32.goner.a@mm.html
  • 10W32.Aim Ven@mm. http://securityresponse.symantec.com/avcenter/venc/data/w32.aimven.worm.html

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部