期刊文献+

“火焰”病毒分析与防范 被引量:13

Analysis and Protection of Flame Virus
下载PDF
导出
摘要 随着网络技术的飞速发展,计算机病毒逐渐成为网络安全领域的主要威胁。近年来,网络攻击事件频繁发生,并且规模逐渐增大,已经从传统意义上对个人电脑的攻击演变成对国家网络基础设施及重要信息系统的攻击。文章通过对"火焰"病毒的分析,分别从传播、启动、攻击、防范等方面进行研究,并提出对网络安全防护的相关建议和对策。 With the rapid development of network techniques, computer virus has gradually become the main threat to cyber security. In recent years, network attack happens frequently and scale enlarges, furthermore network attack has transformed from attacking personal computers to hacking the important information system and the nation's network instruments. By analyzing the Flame Virus, this article researched from the aspects of spread, start, attack, prevention and proposed relevant advises and strategy for network security.
出处 《信息网络安全》 2012年第8期157-159,共3页 Netinfo Security
关键词 网络安全 计算机病毒 火焰病毒 分析研究 network security computer virus flame virus analysis and research
  • 相关文献

参考文献6

  • 1安天实验室.对flame病毒攻击事件的分析报告[R].安全实验室,2012-06-01.
  • 2Peter Szor and Guilherme Venere,Skywiper-Fanning the "Flames" of Cyberwarfare [EB/OL]. http://blogs.mcafee.com/enterprise/ security-perspectives/skywiper- fanning-the-flames- o f- cyber- warfare,2012-05-28.
  • 3CrySyS实验室.sKyWIper(a.k-a_Flamea.k-a_Flamer):A complex malware for targeted attacks[R].v1.05.2012-05-31.
  • 4Symantec Security Response's blog ,Flamer: Highly Sophisticated and Discreet Threat Targets the Middle East[EB/OL]. http://www.symantec. com/connect/hlogs/flamer-highly-sophisticated-and-discreet-threat- targets-middle-east, 2012-05-29.
  • 5池水明,周苏杭.DDoS攻击防御技术研究[J].信息网络安全,2012(5):27-31. 被引量:48
  • 6韩阜业,陈震,梁勇,李军.基于覆盖网的协同式网络安全防护与分析系统[J].信息网络安全,2012(4):7-13. 被引量:5

二级参考文献7

  • 1陈震.可信计算认证技术的研究[J].信息网络安全,2007(7):6-8. 被引量:3
  • 2百度百科.DDoS[EB/OL].http://baike.baidu.com/view/23271.htm,2012-03-03.
  • 3HARVERD.Distributed Denial of Service Attacks Against Independent Media and Human Rights Sites[D]. The Berkman Center for Intemet & Society at Harvard University. December 2010. Archived from the original on 2011-05-01. Retrieved 2011.
  • 4Harvard. DDoS Public Media Reports[D].Archived from the original on 2011-05-01.
  • 5百度. RFC 4987-TCP SYN Flooding Attacks and Common Mitigations[EB/OL]. http:/ /www.baidu,com/s?bs=Distributed+ Denial +of+ Service+ Attacks+ Against + Independent + Media +and +Human+Ri&f=8&rsv_bp= 1&rsv_spt=3&wd=RFC+4987+- Flooding+Attacks+and+Common+Mitigations&rsv n=2&inputT=578, 2012-03-03.
  • 6MADS. How To: Harden the TCP/IP Stack[EB/OL].http://msdn. microsoft.com/en-us/library/ff648853.aspx, 2012-03-03.
  • 7陈震,邓法超,黄石海,彭雪海,李国栋,姜欣,罗安安,彭冬生,张英,张闰华.TCG-TNC可信网络连接系统设计与实现[J].信息网络安全,2009(7):49-52. 被引量:3

共引文献50

同被引文献128

引证文献13

二级引证文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部