期刊文献+

网络安全战略预警系统研究 被引量:4

Study on Network Security StrategicIndication/Warning System
原文传递
导出
摘要 网络安全战略预警系统是一个针对开放性信息源的决策支持系统,它是一个概念性的体系结构,目的是针对信息战的攻击提供威胁评测和预警。主要阐述战略预警方法、战略预警系统结构、系统模型及系统设计。 Network Security Strategic Indication/Warning is a concept that aims to provide threat assessment and Indicators &Warnings of an IW attack. It is the conceptual architecture of an open source decision support system. This paper describe the method , architecture , model and designing of Network Security Strategic Indication/Warning system. The aim of this paper is causing deep study on this system.
出处 《通信技术》 2001年第7期90-92,共3页 Communications Technology
基金 国家863-301-05-04资助项目
关键词 战略预警系统 计算机网络 信息战 网络安全 strategic indicators and warnings, attack detection system(ADS), threat assessment system(TAS), intelligence fusion system(IFS), information warfare(IW)
  • 相关文献

参考文献4

  • 1安德烈·博福尔.战略入门.北京:军事科学出版社,1989.
  • 2Cimbala S J. Nuclear Crisis Management and Information Warfare. Parameters, 1999: 117-128.
  • 3US Infrastructure Assurance Strategic Roadmaps, Strategies For Preserving Our National Security, 1998.
  • 4Rathmell A. Overill R. Valeri L, Information Warfare Attack Assessment System(IWAAS). Information Warfare Seminar, 1997.

同被引文献27

  • 1张峰,秦志光,刘锦德.基于入侵事件预测的网络安全预警方法[J].计算机科学,2004,31(11):77-79. 被引量:11
  • 2Rathmell A,Dorschner J,Knights M,et al. Summary of Research Results:Threat Assessment and Early Warning Methodologies for Information Assurance[EB/OL]. http://www.iaac.org.uk/Publications/ROPA/Website%20summary.pdf,2003.
  • 3Rathmell A,Overill R,Valeri L. Information Warfare Attack Assessment System[EB/OL]. http://www.kcl.ac.uk/orgs/icsa/Old/iwaasppr.PDF,2003.
  • 4Eskin E,Miller M,et al. Adaptive Model Generation for Intrusion Detection Systems[EB/OL]. http://www.cs.columbia.edu/ids/FCblications/adaptive-ccsids00.pdf,2003.
  • 5Lee W,Stolfo SJ,et al. Real-Time Data Mining-based Intrusion Detection[EB/OL]. http://www.cs.columbia.edu/ids/concept/,2003.
  • 6Lee W,Stolfo SJ,Mok K. Data mining in work flow environments:Experiences in intrusion detection[A]. Proceedings of the 1999 conference on Knowledge Discovery and Data Ming(KDD-99)[C]. 1999.
  • 7Warrender C,Forrest S,Pearlmutter B. Detecting intrusions using system calls:alternative data models[A]. Proceedings of the 1999 IEEE Symposium on Security and Privacy[C]. IEEE ComFCter Society,1999. 133-145.
  • 8Yau SS,Zhang XY. ComFCter network intrusion detection,assessment and prevention based on security dependency relation[EB/OL]. http://dlib.comFCter.org/conferen/compsac/0368/pdf/03680086.pdf,2003.
  • 9袁琳.计算机网络安全影响因素及防范措施探讨[J].科技资讯,2011,9(12):16-16. 被引量:10
  • 10戴艳梅.俄罗斯反恐机制研究[J].俄罗斯东欧中亚研究,2012(5):31-38. 被引量:13

引证文献4

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部