对计算机网络安全问题的探析
摘要
随着宽带业务的迅猛发展以及社会对网络的依赖,来自互联网的网络安全问题日益突显。本文简要地分析了计算机网络存在的几种安全隐患,并探讨了计算机网络的安全防范措施。
出处
《中国新通信》
2013年第17期28-29,共2页
China New Telecommunications
二级参考文献13
-
1[1]D E Denning. An Intrusion-Detection Model[J].IEEE Transactions on Software Engineering, 1987;SE-13(2) :222-2
-
2[2]G Vigna,R A Kemmerer. NetSTAT:A Network-based Intrusion Detection Approach[C].Proceedings of the 14th Annual Computer Security Conference,Scottsdale,Arizona, 1998.12
-
3[3]S Kumar. Classification and Detection of Computer Intrusions[D].PhD Dissertation. Department of Computer Sciences,PurdueUniversity,1995
-
4[4]J Balasubramaniyan,J Omar Garcia-Fernandez,D Isacoff et al.An Architecture for Intrusion Detection using Autonomous Agents[R].Department of Computer Sciences,Purdue University,Coast TR 98-05,1998
-
5[5]Frincke D,Don Tobin,Jesse McConnell et al.A Framework for Cooperative Intrusion Detection[C].Proceedings of the 21 st National Information Systems Security Conference,1998.10:361-373
-
6[6]W Lee,S J Stolfo,K Mok. A Data Mining Framework for Building Intrusion Detection Models[C].Proceedings of the IEEE Symposium on Security and Privacy, 1999
-
7[7]Guy Helmer,Johnny S K Wong,Vasant Honavar et al.Intelligent Agents for Intrusion Detection[C].Proceedings,IEEE Information Technology Conference, Syracuse, NY, 1998.9:121-124
-
8[8]M Conner,C Patel,M Little. Genetic Algorithm/Artificial Life Evolution of Security Vulnerability Agents[C].Army Research Laboratory Federal Laboratory 3rd Annual Symposium on Advanced Telecommunications & Information Distribution Research Program(ATIRP),1999.2
-
9[9]Jacobs S,D Dumas,W Booth et al.Security Architecture for Intelligent Agent Based Vulnerability Analysis[C].Proceedings:3rd Annual Fedlab Symposium on Advanced Telecommunications/Information Distribution Research Program, College Park, MD.37,1999.2: 447-451
-
10[10]Barrett Michael,W Booth,M Conner et al. Intelligent Agents System Requirements and Architecture[R].Report to ATIRP,1998.10
共引文献41
-
1孙美凤,龚俭.一种基于免疫学的园区网入侵检测模型[J].计算机工程与科学,2004,26(10):34-36. 被引量:2
-
2仇宇.基于防火墙技术的园区网安全研究[J].福建电脑,2005,21(2):35-36. 被引量:1
-
3蒋道霞.入侵检测系统的规则研究与基于机器学习的入侵检测系统模型[J].现代电子技术,2005,28(17):24-27. 被引量:2
-
4柳晶,蒋天发.基于Intranet入侵检测的研究[J].中南民族大学学报(自然科学版),2006,25(1):88-90. 被引量:2
-
5胡坤华.人工免疫原理在NIDS中的研究[J].宜春学院学报,2006,28(2):56-58.
-
6常学洲.计算机网络安全及防范技术综述[J].石家庄铁路职业技术学院学报,2006,5(2):75-78. 被引量:9
-
7张帆.IP网络行为库的研究与应用[J].福建电脑,2007,23(4):72-73.
-
8杨茹,赵峰,王亚东.网络入侵检测系统的研究[J].黑龙江工程学院学报,2007,21(3):27-29. 被引量:1
-
9洪伟铭.网络安全问题分析与对策[J].韶关学院学报,2007,28(3):47-49.
-
10刘明川,彭长生.基于动态映射的入侵检测系统研究[J].西南农业大学学报(社会科学版),2008,6(2):124-127.