期刊文献+

网络深层防御体系模型的研究和实现 被引量:1

Research and Implementation of Network Defense In-Depth System Model
下载PDF
导出
摘要 针对单一技术在安全防御上存在的缺陷,提出了一个基于三层防御机制的网络安全防御体系模型。该体系有机结合了防火墙、NIPS、基于异常的入侵检测、蜜罐等多种安全技术深层抵御入侵,各组件通过传递XML信息互相协作。首先对网络的安全和结构进行分析,在此基础上给出了体系模型并说明了模型的工作流程,对涉及的关键技术做了探讨,给出了蠕虫攻击实验测试系统的性能。实验结果证明该体系不仅能阻断已知攻击,对未知攻击也做到了有效防御。 Focusing on the defects of the single technology on security prevention, proposed a network defense system model based on the three- level defense mechanism. The model that organically ioined firewall, NIPS, AIDS, honeypot anci so on had resisted attack in - depth, components cooperated by transmiting XML message. Firstly, the design thought of the security prevention system was described in the paper, and based on the thought, the architecture and workflow of the model was presented, and then the relevant sore technology was discussed. Lastly the worm attack experiment was presented to test the performance of the system. The experiment proved that the model not only blocked the known attack but also achieved the effective defense to the unknown attack.
作者 李菲 乔佩利
出处 《计算机技术与发展》 2008年第2期159-162,共4页 Computer Technology and Development
基金 国家社会公益研究专项(2005DIB2J218)
关键词 防火墙 入侵检测 蜜罐 NIPS XML firewall intrusion detection honeypot NIPS XML
  • 相关文献

参考文献5

二级参考文献21

  • 1The honeynet project. http://projeet.honeynct.org.
  • 2Lance Spitzner. Definitions and value of honeypots. Http://www.tracking-hackers.com/papers/honeypots.html, 2003,5.
  • 3Deception Toolkit. 2001. http://www.all.net/dtk/index.html.
  • 4Intrusion battleground evolves. http://www. nwfusion. com/reviews/2001/1008bg.html.
  • 5Review: Intrusion-detection products grow up. http://www.nwfusion.com/reviews/2001 / 1008rev. html.
  • 6The honeynet project: Know your enemy. 2002,12, http://www.linuxsecurity.com/teature stories/honevnet-review-kye.html.
  • 7Klug D. Honeypots and intrusion detection. 2000.9.13,www. san.org/in fosecfaq/honeypots.
  • 8Levine J, LaBella R, Owen H, Contis D, Culver B. The use of honeynets to detect exploited systems across large enterprise networks. Proc. of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY,June 2003,www. tracking-hackers.com/papers/gatech-honeynet.pdf.
  • 9Nathalie Weiler. Honeypots for distribute denial of service attacks. 2002, 10, htp://www. tik.ee.cthz.ch/-weiler/papers/wetice02.pdf.
  • 10Global Integrity Corporation. Honeypot Effectiviness Study.http://www. recose. com/download/press/releases/honeypot.pdf, 2000-09

共引文献22

同被引文献9

  • 1CG Specification Architecture Overview Specification (Revisiord - 2 ) [EB/OL]. 2004. https://www.tmstedcom- putinggroup. org/downloads/TCG - 1_ 0 Architecture Overview pdL.
  • 2Trusted Mobile Platform Specification Hardware Architecture Description [ EB/OL ]. 2004. http://www.trustedmobile. org/TMP_ HWAD_ rev100. pdf.
  • 3Trusted Computing Group(TCG). TCG Specification Version 1.2 Revision 62. TPM Main Part 1: Dsign Principles [ EB/ OL]. 2003 - 10. https://WWW.trustedcomputinggroup.org/downloads/tpmwg - mainrev 62 Part 1 Design Principles.pdf.
  • 4Winsborough W H, Seamons K E, Jones V E. Automated trust negotiation[ C]//In: DARPA Information Survivability Conf. and Exposition. New York: IEEE Press, 2000: 88- 102.
  • 5Trusted Computing Group. TNC IF - IMC Specification v1. 2 [ EB/OL]. 2007 - 02. https://www. trustedcomputinggroup. org/downloads/TCG - 3_ 0 Architecture Overview pdL.
  • 6Trusted Computing Group. TNC IF - IMV Specification v1. 2 [ EB/OL]. 2007 - 02. https://www.trustedcomputinggroup.org/downloads/TCG - 4_ 0 Architecture Overview pdL.
  • 7Balfe S, Lakhani A D, Paterson K G. Securing peer- to - peer networks using trusted computing[ M]. [ s. I. ]: IEEE Press, 2005 ;271 - 298.
  • 8Sailer R, Zhang R. Design and implementation of a TCG - based integrity measurement architecture[C]//Proceedings of the 13th Unix Security Symposium. San Diego: [s. n. ] ,2004.
  • 9赵纪涛,马莉,王现君,尚光龙.一种自适应的模糊关联规则挖掘算法[J].计算机技术与发展,2008,18(5):64-66. 被引量:7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部