期刊文献+

基于计算机资源知识库的安全预警系统设计 被引量:4

Security warning system design based on knowledge base of computer resources
下载PDF
导出
摘要 针对计算机应用中面临的日益严峻的安全风险,尤其是网络环境下硬件和软件系统易于被黑客攻击、病毒侵扰等问题,分析了影响计算机安全的主要因素,研究了消除风险的措施方法,提出了基于计算机自身硬件和软件资源知识库的安全预警系统设计方案。通过WMI技术实现对设备信息的检测,利用专家诊断系统,对可能出现的安全隐患及时报警,并提供相应的决策支持。实验结果表明,该系统对计算机安全预警及时、准确,可以侦测硬件、软件资源的现有状况,有效保护计算机系统的运行安全。 According to the problems of increasingly serious security risk in computer applications, especially in the network en- vironment, the hardware and software systems are easy to be attacked by hacker, and invaded by virus. The main factors that af- fect the computer security is analyzed. The measures that eliminate the risk is studied. The design proposal of security warning system based on their own computer hardware and software resources knowledge base is proposed. The device information detec- tion is implemented by the technology of WMI, the expert diagnostic system is used, a timely warning is achieved to the possible security risks, and provide the appropriate decision support is provided. The experiments show that this system provide warning for computer security timely, accurate, and can detect computer hardware, software resource current states, protect the safe operation for computer system effectively.
作者 李志伟 李岳
出处 《计算机工程与设计》 CSCD 北大核心 2013年第1期55-58,65,共5页 Computer Engineering and Design
关键词 资源 知识库 安全预警 检测 硬件 软件 resource knowledge base security warning detection hardware software
  • 相关文献

参考文献15

二级参考文献102

共引文献57

同被引文献17

  • 1沈辉,张龙.基于WinPcap的网络数据监测及分析[J].计算机科学,2012,39(S2):15-18. 被引量:18
  • 2付小宁,王炳健,王荻.光电定位与光电对抗[M].北京:电子工业出版社,2012.
  • 3FLIR Commercial Systems Inc. Tau camera user's manual [OL]. http://www, flit. com,2011.
  • 4Atymtaycva Lyazzat B,Bortsova Gerda K,Inoue Atsushi,et al.Methodology and ontology of expert system for infor- mation security audit[ C].6th International Conference on Soft Computing and Intelligent Systems,and 13th Interna- tional Symposium on Advanced Intelligence Systems,Kobe:IEEE,2012.
  • 5Liu Jing,Wang Xiauni,Jiao Dongliang,et al.Research and design of security audit system fro compliance [ C ].Proceedings of 2012 International Symposium on Informa- tion Technologies in Medicine and Education,Hokodate:IEEE Sapporo Sect,2012.
  • 6Pereira Teresa,Dinis Santos Henrique M.An audit frame- work to support itfformation system security management [ J ].International Journal of Electronic Security and Digital Forensics,2010,3(3):265 - 277.
  • 7Kozhakhmet K,Bortsova G,Inoue A,Atymtayewl L.Expert System for Security Audit using fuzzy logic [ C ].Proceedings of the 23rd Midwest Artificial Intelligence and Cognitive Science Conference,Cincinnati:MAICS,2012.
  • 8Yu Yong,Niu Lei,Yang Guomin,et al.On the security of auditing mechanisms for secure cloud storage [ J ].Future Generation Computer Systems,2014,30(1):127 - 132.
  • 9徐赏,黄建国,李力.S模式数据链CRC校验实现方法[J].测控技术,2012,31(2):27-30. 被引量:3
  • 10陈学军.Windows平台下串口通信数据实时获取与监测[J].自动化仪表,2012,33(3):66-69. 被引量:13

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部