期刊文献+

基于Snort的校园网入侵检测系统设计及优化 被引量:1

Design and Optimization: Snort-Based Campus Network Intrusion Detection System
下载PDF
导出
摘要 分析了snort系统结构及工作流程,提出了校园网环境中应用防火墙和网络入侵检测系统的网络安全体系架构,构建了一个基于snort的校园网入侵检测系统,并探讨了snort系统优化策略。 This paper has analyzed the structure and work flow of the Snort system, proposed the network security structure of campus network which uses the firewall and network intrusion detection system, and built a Snort - based campus network intrusion detection system, and explored its optimization strategy.
作者 任杰
出处 《四川文理学院学报》 2009年第2期43-45,共3页 Sichuan University of Arts and Science Journal
关键词 SNORT 校园网 入侵检测 系统设计 优化策略 Snort campus network intrusion detection system design optimizing strategy
  • 相关文献

参考文献6

  • 1Rafeeq Ur Rehman. Intrusion Detection Systems with Snort. Pearson Education, Inc. Publishing as Prentice Hall PTR Upper Saddle River, New Jersey 07458.
  • 2snort, org. http ://www. snort, org/. 2007.
  • 3张松.一种NDP中间人攻击及对策[J].四川师范大学学报(自然科学版),2008,31(5):623-626. 被引量:2
  • 4Brian Caswell, Jeremy Hewlett. SnortUsers Manual. Snort TM ,2004 : 126 - 127.
  • 5刘芳,王玲.基于矩阵行搜索求解排课表问题的算法[J].四川师范大学学报(自然科学版),2007,30(4):530-532. 被引量:4
  • 6康振勇,田玉敏.网络入侵检测系统Snort的研究与改进[M].西安:西安电子科技大学出版社,2006.

二级参考文献11

  • 1Dempster M A H. Two Algorithm for the Time-table Problem [ C ]//Combinatorial Mathematics and its Applications. Welshed D J A. New York:Academic Press,1971:63-68.
  • 2Deering S, Hinden R. RFC2460--Internet Protocol Version 6 (IPv6) Specification [ S/OL]. Category: Standards Track, 1998. http ://www. faqs. org/rfcs/rfc2460. html.
  • 3Shea G, Roe M. Child-proof authentication for MIPv6 [ J ]. ACM Computer Communications Review,2001,31 (2) :4-8.
  • 4Nikander P, Ylitalo J, Wall J. Integrateing Security, Mobility, and Multi-homing in a HIP Way[ C/OL]//Network and Distributed Systems Security Symposium. San Diego,2003:87-99. http ://www. isoc. org/isoc/conferences/ndss/03/proceedings. shtml.
  • 5Montenegro G, Castelluccia C. Statistically Unique and Cryptographically Verifiable Identifiers and Address [ C/OL]//ISOC Symposium on Network and Distributed System Security. San Diego ,2002. http ://www. isoc. org/isoc/conferences/ndss/02/proceedings. shtml.
  • 6Narten T, Nordmark E, Simson W. RFC2461-Neighbor Discovery for IP Version 6[ S/OL]. Category: Standards Track Sun, 1998. http://www.pcppc. cn/zuwang/xieyi/zuwang 83602. html.
  • 7Nikander P, Kempf J, Nordamark E. RFC3756-IPv6 Neighbor Discovery Trust Models and Threats [ S/OL]. Category:Standards Track,2004. http ://www. ipv6. org. tw/rfc/ipv6_rfcs. html.
  • 8Aura T. RFC3972--Cryptographically Generated Addresses [ S/OL]. Category,: Standards Track,2005. http://www. qqread. com/net - protocol/e347165081. html.
  • 9Arkko J, Kempf J, Zill B. RFC3971-Secure Neighbor Discovery [ S/OL]. Category : Standards Track,2005. http ://www. yesadmin. comf653/151644/index.html.
  • 10Crawford M. RFC2464-Transmission of IPv6 Packets over Ethernet Networks[ S/OL]. Category :Standards Track, 1998. http :// www. qqread. com/net - protocol/e672166081. html.

共引文献4

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部