期刊文献+

网络安全与入侵检测技术 被引量:5

Techniques of Internet Security and Attack Examining
下载PDF
导出
摘要 网络安全问题已经不再只是金融、军事领域关心的问题 ,对网络安全中的口令、缓冲区溢出、程序、网络监听、拒绝服务等攻防技术作了简要介绍 ,尤其是对保证网络安全 ,对内部攻击。 The security problem of Internet is not a problem concerned only with the financial and military fields any more. This paper not only briefly introduces the attacking and defending techniques of password, buffer overflow, using program, network monitor and refusing serrice in Internet security system, but also gives a detailed introduction and analysis on the attack examining technique that guarantees the Internet security and offer timely protection to inner attacking, outer attacking and error operation.
作者 张鹰 王朝斌
出处 《四川师范大学学报(自然科学版)》 CAS CSCD 2002年第3期324-327,共4页 Journal of Sichuan Normal University(Natural Science)
关键词 网络安全 入侵检测 网络攻击 网络防护 口令攻击 缓冲区溢出 网络监听 Internet security Attack examining Internet attack Internet defending
  • 相关文献

参考文献1

  • 1楚狂.网络安全与放火墙技术[M].北京:人民邮电出版社,2000.

同被引文献28

  • 1吴薇.信息安全——防火墙的应用研究[J].南平师专学报,2005,24(2):27-30. 被引量:2
  • 2林海涛,何如龙,刘波.外军舰船综合通信系统技术分析[J].中国修船,2006,19(3):31-33. 被引量:15
  • 3[6]Gillam W B,Rogers M.File hound:a forensic tool for first responders[C]//Digital Forensic Research Workshop (DFRWS).New Oreans,LA,2005:11-17.
  • 4[7]New Technology Inc.GetSlack 2.0[EB/OL].[2006-10-10].http://www.forensics-intl.com/.
  • 5[8]TCT (The Coroner's Toolkit)[EB/OL].[2006-05-09].http://www.porcupine.org/forensics/tct.html.
  • 6[9]Guidance Software.EnCase Forensic Edition[EB/OL].[2006-10-08].http://www.encase.com.
  • 7[1]Kulesh S,Nasir M.Automatic reassembly of document fragments via context based statistical models[C]//Proceedings of the 19th Annual Computer Security Applications Conference.Las Vegas,NV,2003:152-159.
  • 8[2]Nasir M,Anandabrata P.Automated reassembly of file fragmented images using greedy algorithms[J].IEEE Transactions on Image Processing,2006,15 (2):385-392.
  • 9[4]Reith M,Carr C,Gunsch G.An examination of digital forensic models[J].International Journal of Digital Evidence,2002,1(3):123-127.
  • 10[5]Palmer G.A road map for digital forensic research[R]//The First Digital Forensic Workshop,DFRWS Technical Report DTR-T001-01[EB/OL].[2001-11-06].http://www.dfrws.org/dfrws-rm-final.pdf.

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部