期刊文献+

IDS技术及其在校园网安全管理中的应用 被引量:1

IDS technology and its applications in the campus network security management
下载PDF
导出
摘要 在校园网安全管理实践中,IDS技术发挥了至关重要的作用.在实践中,要加强IDS技术在校园网安全管理中的应用力度.为了明确这一目标,本文从IDS技术的作用及分类着手,给出了新型校园网IDS网络架构设计分析与校园网安全系统中IDS的设计实例,对校园网的安全管理有很实际的应用. In the practice of Campus network security management , IDS technology has played a crucial role .In practice , it is necessary to strengthen the efforts of the IDS campus network security management .In order to clarify this goal , the paper proceed from IDS technology and classification , the new campus network the IDS network architecture design and analysis with the campus network security system and the design of IDS instance were given, have very practical application of campus for network security management .
作者 杨克领
出处 《商丘师范学院学报》 CAS 2014年第9期44-46,共3页 Journal of Shangqiu Normal University
基金 河南省科技厅对外合作项目(134300510058)
关键词 IDS技术 校园网 安全管理 应用 IDS technology campus network security management application
  • 相关文献

参考文献4

二级参考文献17

  • 1[美]RebeccaGurleyBace著 陈明奇 吴秋新 等译.入侵检测[M].北京:人民邮电出版社,2001.210.
  • 2[1]BACE R G.入侵检测[M].北京:人民邮电出版社,2001.
  • 3[3]STOLFO S, ANDREAS L. JAM: Java Agent for meta-learning over distributed database [EB/OL]. http://www. es. columbia. edu/sal/JAM/PROJECT,2001.
  • 4[5]ASAKA M, OKAZWAA S. A method of tracing intruders by use of mobile agents [EB/OL]. http://www. ipa. go. jp/STC/IDA, 2001.
  • 5Rebecca Gurley Bace.入侵检测[M].北京:人民邮电出版社,2001.49-80.
  • 6Huang Han-pang,Chang Chia-ming.An active network-based intrusion detection and response systems[J].Conference Proceeding IEEE International Conference on Networking,Sensing and Control,2004,2:1317-1322.
  • 7Huang I-hsuan,Yang Cheng-zen. Design of an active intrusion monitor system[J].IEEE Annual International Carnahan Conference on Security Technology,Proceedings,2003,(14):485-492.
  • 8Theuns Verwoerd,Ray Hunt.Intrusion detection techniques and approadches[J].Computer Communications,2002,25:1356-1365.
  • 9Han Hong,Lu Xian-liang,Ren Li-yong.Using data mining to discover signatures in network-based intrusion detection[R].Proceedings of 2002 International Conference on Machine Learning and Cybernetics,2002,(1):13-17.
  • 10Wu Lih-chyau,Chen Sout-fong.Building intrusion pattern miner for snort network intrusion detection system[J].IEEE Annual International Carnahan Conference on Security Technology,Proceedings,2003,(14):477-484.

共引文献8

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部