期刊文献+

基于还原保护的分布式病毒防御机制研究

Defence against Distributed Virus Based on Restoring and Protection
下载PDF
导出
摘要 目前,大多杀毒软件不具备集中预警和管理功能,对于具有一定规模并需要集中管理、降低成本投入的局域网来说,还原保护是计算机防毒和管理的一种有效手段,但面对网络病毒它仍存在着诸多不足。为此,针对在计算机设备上具有还原保护功能的局域网,研究了一种分布式多层结构模式的病毒防御机制及其实现方法,可使网络在相对较低成本的情况下有效提高防毒能力。 At present,most of anti-virus software does not have the function of centralized early warning and management.Anti-virus software is not the ideal anti-virus tool for LAN which has a certain scale and needs for centralized management and in low cost.Restoring and protection is a kind of effective means for computer anti-virus and management,it can lower the cost as well.However,it still has many inadequacies for network virus defence.A kind of distributed virus defence mechanism was discussed and its implementation was conduced.The defence method could effectively improve the virus defence capability for the LAN at a low cost by the way of making the computer device have the function of restoring and protection.
出处 《武汉理工大学学报(信息与管理工程版)》 CAS 2010年第3期382-385,共4页 Journal of Wuhan University of Technology:Information & Management Engineering
关键词 分布式多层结构 数据库 病毒防御 进程管理 漏洞扫描 distributed multilayer structure database virus defence process management vulnerability scanner
  • 相关文献

参考文献8

二级参考文献21

  • 1张伟,王豪,徐文艳.基于J2EE通用呼叫中心运营平台的研究与应用[J].计算机工程,2006,32(2):237-239. 被引量:10
  • 2金仑.一种分布环境下面向用户的授权模型[J].电子技术应用,2006,32(4):11-13. 被引量:2
  • 3Thimbleby H,Anderson S,Cairns P.A Framework for Modeling Trojans and Computer Virus Infections.The Computer Journal,1998,41(7):444~458
  • 4Buteler J R Ⅱ.Detecting Compromises of Core Subsystems and Kernel Functions in Windows NT/2000/XP:M.S.Thesis,University of Maryland,Baltimore County,2002
  • 5Butler J,Jeffrey L.Undercoffer and John Pinkston.Hidden Processes:The Implication for Intrusion Detection.In:Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy,West Point,NY,June 2003
  • 6Levine J G,Grizzard J B,Hutto P W,Owen H L.A Methodology to Characterize Kernel Level Rootkit Exploits that Overwrite the System Call Table.In:Proceedings of IEEE.SoutheastCon,IEEE,2004.25~31
  • 7Levine J,Grizzard J,Owen H.A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.In:Second IEEE International Information Assurance Workshop,2004
  • 8Solomon D A,Russinovich M E.Inside Microsoft Windows2000 (Thrid Edition)[M].美国:微软出版社,2000.
  • 9Microsoft公司.Windows Device Driver Development Kit Design Guide[M].美国:微软出版社,2001.
  • 10yanger,thinking,等.Spring中文参考手册1.0.http://xgl2.51.net/5team/springframework.

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部