期刊文献+

一种网络安全事件自动处理平台的设计 被引量:1

Design and Realization of Automatic Processing Platform for Network Security Events
下载PDF
导出
摘要 为实现对网络安全事件的高效适时处理,本文给出了一种集成的网络安全事件处理业务支撑环境的平台搭建设计,并详细阐述了系统整体架构、数据库和业务流程的设计过程。该设计方法具有较强的普实性,可以直接移植应用到其它办公自动化系统的设计环节。 In order to process the network security event efficiently and timely,this paper proposes a method to design the platform of the integrated environment for network security events,and expatiates upon the design of system infrastructure,database and business flow.As this method possesses universality,it can be applied to design other automatic office system directly.
出处 《武汉船舶职业技术学院学报》 2009年第5期41-46,共6页 Journal of Wuhan Institute of Shipbuilding Technology
基金 江苏省自然科学基金06KJB520132 BK2007074 BK2009699资助 湖北省教育厅科研项目Q20085301资助
关键词 网络安全事件 数据库 network secure event database
  • 相关文献

参考文献4

二级参考文献39

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2P Dasgupta,S Gokhale.Distributed authentication for Peer to Peer networks[A].IEEE Workshop on Security and Assurance in Ad hoc Networks[C].Orlando,FL,January 28,2003.347-353.
  • 3Lakshmi Venkatraman,Dharma P Agrawal.A novel authentication scheme for Ad hoc networks[A].Wireless Communications and Networking Confernce (WCNC 2000)[C].Chicago,2000.1269-1273.
  • 4Yongguang Zhang,Wenke Lee.Intrusion detection in wireless Ad-Hoc networks[A].Proc of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000)[C].Boston,MA,2000.275-283.
  • 5Oleg Kachirski,Ratan Guha.Intrusion detection using mobile agents in wireless Ad Hoc networks[A].IEEE Workshop on Knowledge Media Networking (KMN'02)[C].Kyoto,JAPAN,2002.153-158.
  • 6Chin-Yang Tseng,Poornima Balasubramanyam,et al.A specification-based intrusion Detection system for AODV[A].2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)[C].Fairfax,VA,USA,October 2003.
  • 7Ping Yi,Yiping Zhong,Shiyong Zhang.Real-time protocol analysis for detecting routing attacks in mobile Ad Hoc networks[A].Fifth IEEE International Symposium and School on Advance Distributed Systems (ISSADS2005)[C].Lecture Notes in Computer Science,Guadalajara,Jalisco,México,January 2005.
  • 8P Michiardi,R Molva.Simulation-based analysis of security exposures in mobile ad hoc networks[A].Proc of European wireless conference[C].Firenze,Italy,2002.
  • 9Levente Buttyan,Jean-Pierre Hubaux.Enforcing service availability in mobile Ad-Hoc WANs[A].Proc of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)[C].Boston,MA,USA,August 2000.87-96.
  • 10L Buttyán,J -P Hubaux.Stimulating cooperation in self-organizing mobile Ad Hoc networks[J].Mobile Networks and Applications,2003,8(5):579-592.

共引文献70

同被引文献1

  • 1武苍林.Bs与cs结构的分析与比较[J].电脑学习,2003,(10):35.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部