期刊文献+

网络安全事故初探 被引量:1

Network security incidents Preliminary
下载PDF
导出
摘要 传统的网络安全方案主要采用的是防御为主的安全策略,通过防火墙、杀毒软件、安装系统补丁等手段加强网络的防护能力,从而达到抵御网络攻击者入侵的目的。随着对网络安全性要求的不断提高,逐步出现了网络入侵检测系统、蜜罐技术等基于主动防御的网络安全手段,但在实际的使用过程中,并没有形成一个完整的体系,对网络入侵的防范以及网络事故发生以后的处理作用有限。 Therefore,ensuring network security,especially on banking,telecommunications,Government,and other in- ternal network information security is very important.Tradi- tional network security key is used in the defense of security policy,firewall,anti -virus software,installing systems patch and so on means to enhance the defensive capabilities of the network, so as to achieve the aim of protect against net- work attack intrusion.With the network security requirements continued to improve gradually technologies such as network intrusion detection systems,honeypots appear active defense based network security measures,but in actual use in the process, does not form a complete set of system, network in- trusion prevention,and network limited role after the accident
作者 田海宇
出处 《北方经贸》 2012年第10期106-107,共2页 Northern Economy and Trade
关键词 入侵 网络安全事故 安全策略 Invasion network security security policies
  • 相关文献

参考文献4

  • 1Fink G A,Muessig P,North C.Visual corrtation of host processes and network traffie[C].InProc.of Vizsec 2005:10.
  • 2Cheung D W,Han J W,Ng V T. Maintenance of discovered association rules in large databases:an incremental updating technique [C].Proceedings of the 12th International Conference on Data Engineering. Los Alamitos: IEEE Computer Society, 1996: 106-11d.
  • 3曾良军.分布式银行发行电子现金实现方案[J].郑州信息工程大学学报,2005(6):1l-13.
  • 4袁丹,张玉清.网络可生存性定义研究[J].计算机研究与发展,2006,43(z2):525-529. 被引量:6

二级参考文献9

  • 1杨超,马建峰.可生存网络系统的形式化定义[J].网络安全技术与应用,2004(7):39-41. 被引量:9
  • 2[1]R Westmark.A definition for information system survivability.In:Proc of the 37th Hawaii Int'l Conf on System Sciences.Los Alamitos,CA:IEEE Computer Society Press,2004.2086 -2096
  • 3[2]Manijeh Keshtgary,Fahad A Al-Zahrani,Anura P Jayasumana,et al.Network survivability performance evaluation with applications in WDM networks with wavelength conversion.In:Proc of the 29th Annual IEEE Int'l Conf on Local Computer Networks (LCN'04).Los Alamitos,CA:IEEE Computer Society Press,2004.344-351
  • 4[3]Aaron Helsinger,Karl Kleinmann,Marshall Brinn.A framework to control emergent survivability of multiagent systems.In:Proc of the 3rd Int'l Joint Conf on Autonomous Agents and Multiagent Systems.Los Alamitos,CA:IEEE Computer Society Press,2004.28-35
  • 5[4]John Koroma,Wei Li,Demetrios Kazakos.A generalized model for network survivability.In:Proc of the 2003 Conf on Diversity in Computing.New York:ACM Press,2003.47-51
  • 6[5]Casey K Fung,Patrick C K Hung,Deborah H Folger.Achieving survivability in business process execution language for Web services (BPEL) with exception-flows.In:Proc of the 2005 IEEE Int'l Conf on e-Technology,e-Commerce and e-Service (EEE'05) on e-Technology,e-Commerce and e-Service EEE'05.Los Alamitos,CA:IEEE Computer Society Press,2005.68-74
  • 7[6]L Cloth,B R Haverkort.Model checking for survivability.In:Proc of the 2nd Int'l Conf on the Quantitative Evaluation of Systems (QEST'05) on the Quantitative Evaluation of Systems QEST'05.Los Alamitos,CA:IEEE Computer Society Press,2005.145-154
  • 8[8]J C Knight,K J Sullivan.On the definition of survivability.University of Virginia,Department of Computer Science,Tech Rep:CS-TR-33-00,2000.33-48
  • 9[9]John C Knight,Elisabeth A Strunk,Kevin J Sullivan.Towards a rigorous definition of information system survivability.DARPA Information Survivability Conference and Exposition,Washington,USA,2003

共引文献5

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部