期刊文献+

基于3G网络安全系统的入侵检测研究 被引量:5

Intrusion Detection System Based on 3G Network Security System
原文传递
导出
摘要 3G(第三代移动通信系统)系统的安全是3G系统正常运行和管理的基本保障,3G信息的安全性和网络资源使用的安全性已成为3G网络安全将面临更大挑战。文中给出入侵侵检测(IDS)技术的概念并对入侵检测系统做了描述和分析。入侵检测系统作为信息安全保障中一个重要环节,采用主动防御策略应对3G网络安全面临的威胁和存在的安全问题,最后提出基于3G入侵检测的防范和对策。 The security of 3G(Third Generation Mobile Communication System) is the basic guarantee of 3G system operation and management,also the security of 3G information and network resource use has made the 3G network security face even greater challenges.This paper gives the concept of Intrusion Intrusion Detection(IDS) technology,describes and analyzes intrusion detection system.The intrusion detection system,as an important part of infosec assurance,adopts active defense strategy in dealing with the 3G network security threats and security problems.Finally,this paper gives 3G intrusion detection-based prevention and response measures.
作者 吴新民
出处 《通信技术》 2010年第6期98-100,共3页 Communications Technology
基金 浙江省教育厅科研项目(编号:20060002)
关键词 3G网络安全 入侵检测 防范和对策 3G network security intrusion detection prevention and response measure
  • 相关文献

参考文献6

  • 1Anderson J P.Computer Security Threat Monitoring and Surveillance[R].Fort Washington,Pennsylvania:[s.n.] ,1980.
  • 2Garvey A,Lunt D.Model based Intrusion Detection[C] //In Proceedings of the 14th National Computer Security Conference.Washington,D.C,USA:National Computer Security Center,1991:372-385.
  • 3Saha D,Mukherjee A.Mobility Support In IP:A Survey of the Related PrototocolS[J].IEEE Network.2004(10):34-40.
  • 4Denis R,Philippe S.Convergence and Competition on the Way Towards 4G[C] //Radio and Wireless Symposium.Long Beach.California:IEEE,2007:277-280.
  • 5吴新民.4G无线网络安全问题的研究[J].通信技术,2008,41(6):127-129. 被引量:14
  • 6谢玉峰,梁铁柱,郑连清.网络安全综合管理平台的设计与实现[J].通信技术,2009,42(4):139-141. 被引量:13

二级参考文献9

共引文献25

同被引文献32

  • 1汪文俊,龚育昌,朱建明.基于UDP的局域网内时钟同步协议[J].计算机应用与软件,2007,24(5):133-135. 被引量:12
  • 2广州致远公司.ZNE100T说明书[EB/OL].(2007-01-01)[2009-12-04]http://www.zlgmeu.com.
  • 3MAXIM公司.DSl2887说明书[EB/OL].(2006-01-01)[2009-12-04].www.maxim-ic.com.
  • 4奥地利微电子公司.ASll09说明书[EB/OL].(2006-04-05)[2009-12-15].http://www.austriamicrosystems.com.
  • 5SCHMIDT AUBREY-DERRICK,RAINER BYE,SCHMIDT HANS-GUNTHER,et al.Static Analysis of Executables forCollaborative Malware Detection on Android[J].Deutsche Telekom Laboratories,2009(14-18):53-57.
  • 6MICHAEL B,FREILING F C.Towards Dynamic MalwareAnalysis to Increase Mobile Device Security[EB/OL].(2008-10-12)[2011-03-23].http://www1.informatik.uni-erlangen.de/filepool/publications/towards-dynamic-malware-analysis-to-increase-mobile-device-security.pdf.
  • 7WANG C H T,WU C.A Virus Prevention Model basedon Static Analysis and Data Mining Methods[M].[s.l.]:Computer and Information Technology Workshops,2008:288-293.
  • 8Botha R A,Furnell S M,Clarke N L.From Desktopto Mobile:Examining the Security Experience[J].Computers&Security,2009,28(3-4):130-137.
  • 9百军,刘宝旭,蒋文保.移动通信终端信息泄露隐患及时策分析[C]//2009通信理论与技术新发展-第14届全国青年通信学术会议论文集.2010:217-221.
  • 10宇龙计算机通信科技有限公司.一种移动终端与计算机之间安全通信的方法及移动终端:中国,200710124088.8[P].2008-03-26.

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部