期刊文献+

基于入侵防御的计算机网络安全系统研究 被引量:5

Research of Computer Network Security System Based on Intrusion Prevention
下载PDF
导出
摘要 因为因特网互联的本质,让意图不轨的黑客得以入侵网络,窃取机密数据,甚而阻断其所提供的服务,导致网络瘫痪,酿成巨额损失。文章分析了计算机网络安全的现状,分析了入侵防御在计算机网络安全系统的应用。 Because of the interconnected nature of the Internet, hacking with intent to be the invasion of the network, steal confidential data, even blocking the services they provide, to bring down the network, causing huge losses. This paper analyzes the status of computer network security, intrusion prevention applications in computer network security systems.
作者 杨怀磊 潘宁
出处 《煤炭技术》 CAS 北大核心 2013年第2期195-197,共3页 Coal Technology
关键词 计算机网络 信息安全 入侵防御 computer networks information security intrusion prevention
  • 相关文献

参考文献4

二级参考文献11

  • 1赵丽,孙敏.入侵检测系统的性能问题研究[J].计算机工程与应用,2005,41(10):138-140. 被引量:4
  • 2Bai Yuebin,Kobayashi H. Intrusion detection systems: teehnology and development[C]//Kawada S. Proeeedings of the 17th International Conference on Advanced Information Networking and Applications. Washington, DC: IEEE Computer Society, 2003 : 710-715.
  • 3Rroesch M. Snort-lightweight Intrusion detection for networks [C]//Ricketts S, Birdie C, Isaksson E. Proceedings of the 13th LISA Conference. Washington: USENIX, 1999: 229-238.
  • 4Brugger S T. Data mining methods for network intrusion detection[EB/OL].http://www-static.cc. gatech. edu/ -guofei/reading/brugger-dmnid.pdf, 2004.
  • 5Agrawal R, Srikant R. Fast algorithms for mining association rules [C]//Boeea J B, Jarke M, Zaniolo C. Proceed- ings of the 20th International Conference on Very Large Databases. San Francisco: Morgan Kaufmann Publishers Inc, 1994:487-499.
  • 6Rakesh A, Ramakrishnan S. Mining sequential patterns [C]//Yu P S, Chen ALP. Proceedings of the 11th International Conference on Data Engineering. Taipei: IEEE Computer Society, 1995: 3-14.
  • 7Steve Suehring, Robert L. Ziegler, linux防火墙[M].机械上业出版社,2006.
  • 8隋毅,杜跃进.NIDS的改进研究[J].计算机工程,2007,33(9):120-122. 被引量:6
  • 9连一峰,戴英侠,王航.基于模式挖掘的用户行为异常检测[J].计算机学报,2002,25(3):325-330. 被引量:84
  • 10姚兰,王新梅.防火墙与入侵检测系统的联动分析[J].信息安全与通信保密,2002(6):29-31. 被引量:23

共引文献25

同被引文献21

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部