期刊文献+

用户连接切换的关键技术及实现

下载PDF
导出
摘要 本文在介绍入侵诱骗系统的概念基础上给出一个结合环境切换技术的入侵诱骗系统原型,并以此设计出基于TCP层的环境切换子系统和用户连接切换的结构框架。论文提出了用户连接切换中TCP连接状态的提取、数据状态的迁移、socket描述符的一致性的维护等用户连接的关键技术,并加以实现。
作者 平寒
出处 《山东科学》 CAS 2010年第6期99-102,共4页 Shandong Science
  • 相关文献

参考文献6

  • 1ZHANG F.ZHOU S,QIN Z,et al.Honeypot:a Supplemented Active Defense System for Network Security[C] //The 4th International Conference Cll Parallel and Distributed Computing,Applications and Technologies,2003;231 -235.
  • 2TEO L,SUN Y A,AHN C J.Defeating Interet Attacks Using Risk Awareness and Active Honeypots[C] //Information Assurance Workshop,2004.Proceedings.Second IEEE International,2004:155 -167.
  • 3RAYNAL F,BERTHIER Y,BIONDI P,et al.Honeypot Forensics Part I:Analyzing the Network[J].IEEE Security& Privacy,2004,2(4):72-78.
  • 4BAROUDI S,Z1ADE H,MOUNLA,B.Are we really protected against hackers[C]//The 1st International Conferance onlnformation and Communication Technologies:from Theory to Applications,2004;621 -622.
  • 5杨云.在Linux下配置防火墙的技术[J].铁路计算机应用,2004,13(3):37-39. 被引量:2
  • 6陈苒菁,黄天戍.一种新型的自适应入侵检测系统的研制[J].武汉大学学报(理学版),2005,51(3):351-355. 被引量:2

二级参考文献13

  • 1RichardPetersen 王建桥 杨涛 杨晓云 高文雅 等.Red Hat Linux技术大全[M].北京:机械工业出版社,2001..
  • 2OLAF KIRCH TERRY DAWSON 唐钧 张涛 等.Linux网络管理员指南:(第2版)[M].北京:中国电力出版社,2001..
  • 3LEE W. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems [D]. USA: Columbia University,1999.
  • 4Kumar G. Classification and Detection of Computer intrusion [D]. USA: Purdue University,1995.
  • 5Fayyad U, Haussler D, solorz P. Mining Scientific Data[J]. Communications of the ACM, 1996,39 ( 11 ):51-57.
  • 6Spafford E H, Zambonl D. Intrusion Detection Using Autonomous Agents[J]. Computer Networks, 2000,34(4) :47-52.
  • 7Steven A H. An Immunological Model of Distributed Detection and Its Application to Computer Security [D]. USA: University of New Mexico, 1999.
  • 8Luo J. Integrating Fuzzy Logic with Data Mining Methods for Intrusion Detection [M]. USA: Mississippi State University, 1999.
  • 9Ludovic M. A Genetic Algorithm as an Alternative Tool for Security Audit trails Analysis [R]. France:Cesson Sevigne Cedex, Superlec, 1996.
  • 10Han T,Kamber M. Data Mining Concepts and Techniques [M]. USA : Morgan Kaufmann Publishers, 2001.230-236.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部