期刊文献+

综合网络安全系统的研究与设计 被引量:2

Research and design of integral network security system
下载PDF
导出
摘要 在详细分析用户需求的基础上,结合现有网络拓扑结构,提出了一个从点、线到面的综合网络安全系统设计方案。在点上即员工工作站上安装上网行为和带宽管理客户软件,在线上即对外链路上部署防火墙,在面上部署入侵检测设备和上网行为及带宽管理服务器。通过综合利用防火墙、入侵检测、上网行为管理和带宽管理技术,有效保障了企业内部网络的安全,规范了员工的上网行为,满足了企业关键业务的带宽需求。 On the basis of analysis of user' s requirement in detail, topology of network. The solution provides security from points, the system' s solution plan is designed by combing with the present line to areas. At the points, those are employees' workstations, there set up network supervision and bandwidth management clients. On the line, that is link to connect outside, there installs firewall. There deploy intrusion detection equipment and network supervision and bandwidth management server in the areas behind the firewall. Through using firewall, intrusion detection, network supervision and bandwidth management technologies, the solution guarantees the security of Intranet effectively, supervises behavior of network users and satisfies bandwidth requirement of key operations.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第13期3072-3074,共3页 Computer Engineering and Design
基金 国家自然科学基金项目(60373156 10871222 10726012)
关键词 防火墙 入侵检测 上网行为管理 带宽管理 网络安全 firewall intrusion detection network supervision bandwidth management network security
  • 相关文献

参考文献7

二级参考文献42

  • 1李成华,周培源,张新访.基于主机内核的混合型入侵防御系统的设计与实现技术[J].计算机应用与软件,2006,23(7):117-120. 被引量:4
  • 2Tennenhouse D, Smith J, Sincoskie W, Wetherall D, Minden G. A survey of active network research. IEEE Communications Magazine, 1997,(1):80-86.
  • 3Almesberger W. Linux network traffic control - implementation overview. White Paper, April 23, 1999. http://lrcwww.epfl.ch/ linux-diffserv/.
  • 4Mogul JC, Ramakrishnan KK. Eliminating receive livelock in an interrupt-driven kernel. ACM Trans. on Computer Systems, 1997,15(3):217-252.
  • 5McHardy P. The intermediate queuing device. 2004. http://luxik.cdi.cz/~patrick/imq/.
  • 6Stoica I, Abdel-Wahab H. Earliest eligible virtual deadline first: A flexible and accurate mechanism for proportional share resource allocation. Technical Report 9522, Department of Computer Science, Old Dominion University, 1995.
  • 7Floyd S, Jacobson V. Link-Sharing and resource management models for packet networks. IEEE/ACM Trans. on Networking, 1995,3(4).
  • 8Martin Devera. 2004. http://luxik.cdi.cz/~devik/qos/htb/.
  • 9Partridge C. Gigabit Networking. Addison Wesley Publishers, 1994.
  • 10Jones R, et al. Netperf - Software On-Line. 2004. http://www.cup.hp.com/netperf/NetperfPage.html.

共引文献92

同被引文献7

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部