期刊文献+

计算机网络安全问题初探

Study on Computer Network Security Issues
下载PDF
导出
摘要 网络的迅速发展,给我们的工作和生活带来了巨大的改变。在网络日益复杂化,多样化的今天,安全受到人们越来越多的关注。如何保护各类网络和信息的安全,成为人们研究的焦点,如何对计算机网络上的各种非法行为进行主动控制和有效防御,是计算机网络安全亟待解决的问题。 The rapid development of computer network has brought dramatic changes to our work and life. Nowadays,with the network being more complex and diverse,people begin to pay more attention to network security.How to protect the security of various networks and information has become the researching focus,and how to control actively and defend effectively against the illegal actions on the computer network has become an urgent problem demanding solutions.
作者 杨淑清
机构地区 辽宁行政学院
出处 《软件工程师》 2014年第6期38-39,共2页 Software Engineer
关键词 计算机网络 网络安全 信息安全 computer network network security information security
  • 相关文献

参考文献3

二级参考文献9

  • 1Karlton Sequerira,Mohammed Zaki.ADMIT:Anomaly-based data mining for intrusions[C].Canada:Proceedings of the ACM SIGKDD,2002.
  • 2Martin Roesch,Chris Green.Snort users manual[EB/OL].http://www.snort.org/docs/writing_rules/.
  • 3Snort 2.0 protocol flow analyzer,sourcefire inc[EB/OL].http://www.sourcefire.com,2003.
  • 4Fabricio Sergio de Paula,Leandro Nunes de Castro,Paulo Licio de Geus.An intrusion detection system using ideas from the immnue system[C].Evolutionary Computation,CEC,2004:1059-1066.
  • 5Hofmeyr S.The implication of immunology for secure systems design[J].Computers and Security,2004,23(6):453-455.
  • 6Shiuhpyng Shieh,Fu-Yuan Lee,Ya-Wen Lin.Accelerating network security services with fast packet classification[J].Computer Communications,2004,27(16):1637-1646.
  • 7Sanghyun Cho,Sungdeok Cha.SAD:Web session anomaly detection based on parameter estimation[J].Computers and Security,2004,23(4):312-319.
  • 8Information and computer science university of california,irvine[EB/OL].http://kdd.ics.uci.edu/databases/kddcup99/kddcup 99.html.
  • 9赵季中,宋政湘,齐勇.对基于TCP/IP协议的几个网络安全问题的分析与讨论[J].计算机应用研究,2000,17(5):44-47. 被引量:30

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部