期刊文献+

融合认证控制的安全联动模型设计

Design of Security Interaction Model Based on Integration Authentication Control
下载PDF
导出
摘要 在研究联动机制的基础理论之上,设计一种基于接入检测认证机制的融合认证控制的安全联动模型,放低了联动体系的保护层次,通过认证系统、认证接入设备、漏洞扫描、病毒检测、策略服务器等联动,增加从接入层进行有效的检测和保护,具有减轻网络负载、提高检测效率、便于扩展等优点,具有一定的理论和应用价值。 On the basic theory of interaction mechanism, designs a security interaction model based on in- tegration authentication control that based on access testing authentication mechanism, lowers the protection level of interaction system. Adds effective detection and protection from the access layer through authentication system, authentication access devices, vulnerability scanning, virus detection, policy server, etc., so as to reduce network load, improve detection efficiency and expand easily, etc., it has theoretical and practical value.
作者 罗伟 蔡昭权
出处 《现代计算机》 2010年第7期149-152,共4页 Modern Computer
基金 惠州学院校立项目(No.C209.0209)
关键词 网络安全 联动模型 认证控制 Network Security Interaction Model Authentication Control
  • 相关文献

参考文献9

二级参考文献39

  • 1盛思源,战守义,石耀斌.网络安全技术的研究和发展[J].系统仿真学报,2001,13(S2):419-422. 被引量:21
  • 2(美)Andrew S Tanenbaum.计算机网络[M].清华大学出版社,1999..
  • 3美国国家安全局.信息技术保障框架[Z].,2000-09..
  • 4[1]Carver C A. Intrusion Response Systems: A Survey. http://faculty.cs. tamu.edu/
  • 5[2]Schnackenberg D, Djahandari K, Sterne D. Infrastructure for Intrusion Detection and Response. In: Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX), Hilton Head, South Carolina, 2000-01
  • 6[3]Carver Jr C A, Hill J M D, Pooch U. A Methodology for Using Intelligent Agents to Provide Automated Intrusion Response. New York: IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, 2000-06-06
  • 7[4]Jansen W, Mell P, Karygiannis T, et al. Applying Mobile Agents to Intrusion Detection and Response. NIST Interim Report (IR) 6416 , 1999-10
  • 8[5]Wang X Y, Reeves D S, Wu S F, et al. Sleepy Watermark Tracing: An Active Intrusion Response Framework. Paris,FranceIn: the Proce- edings of 16th International Conference of Information Security (IFIP/ SEC01), 2001
  • 9[6]Tennenhouse D L. A Survey of Active Network Research. IEEE Communications Magazine, 1997, 35(1): 80-86
  • 10[7]Sterne D, Djahandari K, Schnackenberg D. Autonomic Response to Distributed Denial of Service Attacks. NAI LABS, Advanced Security Research Journal, 2002, 4(1)

共引文献82

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部