期刊文献+

采用防火墙和入侵检测系统联动模型实现企业网安全方法研究 被引量:2

Research on the Security Method of Enterprise Network by Using a Linked Model of Firewall and Intrusion Detection System
下载PDF
导出
摘要 随着信息化技术的飞速发展,企业的网络应用系统也在不断发展,随之而来的是对企业信息安全的巨大威胁。该文介绍了一种采用防火墙和入侵检测系统联动配合的模型,以实现企业网络及应用系统安全。该方法已经在作者所在单位得到应用,取得了较好的应用效果。在当前网络黑客攻击日益盛行的形势下,该方法对企业网络运维具有重要的参考价值。 With the rapid development of information technology, enterprise net work application system is also developing, fol- lowed by a huge threat to information security. This paper introduces a linked model of firewall and intrusion detection system, which can achieve enterprise network and application system security. The method has been applied in the author' s institute, and achieved a better application effect. In the current situation of the increasingly popular online hacher attacks, this method has im- portant reference value for the operation and maintenance of enterprise network.
作者 蔡芳 CAI Fang (Aircraft Strength Research Institute of China,Xi'an 710065, China)
出处 《电脑知识与技术》 2017年第7期34-35,37,共3页 Computer Knowledge and Technology
关键词 防火墙 入侵检测 信息安全 Firewall Intrusion Detection System Information Security
  • 相关文献

参考文献3

二级参考文献22

  • 1邓长春.浅谈网络信息安全面临的问题和对策[J].电脑与电信,2007(3):60-62. 被引量:10
  • 2徐南荣 仲伟俊.科学决策理论与方法[M].南京:东南大学出版社,1996.2-10.
  • 3李建设,卢辉斌,陈淑清,徐天赋.电子政务系统安全的框架性解决方案[J].计算机工程与设计,2007,28(14):3486-3488. 被引量:15
  • 4Holden G. Guide to Firewalls and Network Security[M]. Boston: Course Technology, 2004.
  • 5Neumarm P, Porras P. Experience with emerald to date[C]//Proceedings of 1st USENIX Workshop Conference. Santa Clara: Intru- sion Detection Network Monitoring, 1999: 73-80.
  • 6Huseyin C, Srinivasan R. Configuration of detection software: A comparison of decision and game theory approach[J]. Decision Analysis, 2004, 1(3): 131-148.
  • 7Alpcan T, Basar T. A game theoretic approach to decision and analysis in network intrusion detection[C]//Proceedings of 42nd IEEE Conference Decision and Control. Hawaii: 2003: 2595-2600.
  • 8Ross A, Tyler M. The economics of information security: A survey and open questions[J]. Science, 2006, 314(27): 610-613. 8.
  • 9Chen L, Jean L. A game theoretical framework on intrusion detection in heterogeneous networks[J]. IEEE Transactions on Informa- tion Forensics and Security, 2009, 4(2): 165-17.
  • 10Hasan C, Huseyin C, Zhang Jun. Security patch management: Share the burden or share the damage[J]. Management science, 2008, 54(4): 657-670.

共引文献14

同被引文献16

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部