期刊文献+

分析光网络网管系统脆弱性及安全光网络建设对策 被引量:1

Vulnerability of Optical Network Management System and Countermeasures of Security Optical Network Construction
下载PDF
导出
摘要 针对分析光网络网管系统脆弱性及安全光网络建设对策研究,从光网络网管系统体系结构概述入手,结合光网络对网管系统的影响,对光网络网管系统的脆弱性进行分析,对构建安全光网络的有效对策展开论述。希望能为下一代安全光网络建设的规划与改进提供参考性建议。 Through studying the vulnerability and security optical network of optical network management system and starting with the overall structure, and combining with the influence of optical networks on network management, this paper analyzes the vulnerability of optical network management system and puts forward effective strategies for the construction of safety optical network, in order to provide reference for the planning and suggestion of safety optical network construction.
作者 朱宗国
出处 《工程建设与设计》 2018年第2期115-116,130,共3页 Construction & Design for Engineering
关键词 光网络 网管系统 安全光网络构建 optical network network management system secure optical network construction
  • 相关文献

参考文献3

二级参考文献41

  • 1王文庆.EPON技术的改进[J].有线电视技术,2012,19(1):106-107. 被引量:3
  • 2Bishop M. , Bailey D.. A critical analysis of vulnerability taxonomies. Department of Computer Science, University of California at Davis: Technical Report CSE-96-11, 1996
  • 3Longley D. , Shain M. , Caelli W.. Information Security: Dictionary of Concepts, Standards and Terms. New York: Macmillan, 1992
  • 4Beizer B.. Software Testing Techniques. 2nd edition. International Thomson Computer Press, 1990
  • 5Farmer D. , Spafford E. H.. The COPS security checker system. Purdue University, West Lafayette: Technical Report,Coast TR 94-01, CSD-TR-993, 1990
  • 6Baldwin R. W.. Kuang: Rule-based security checking. Programming Systems Research Group, Lab for Computer Science, MIT, Massachusetts: Technical Report, 1994
  • 7Zerkle D. , Levitt K. , NetKuang: A multi-host configuration vulnerability checker. In: Proceedings of the 6th USENIX Security Symposium, San Jose, CA, 1996
  • 8Porras P. A. , Kemmerer R. A.. Penetration state transition analysis: A rule-based intrusion detection approach. In: Proceedings of the Eighth Annual Computer Security Applications Conference, 1992, 220~229
  • 9Ilgun K.. USTAT: A real-time intrusion detection system for UNIX. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1993, 16
  • 10Jensen K.. Colored petri nets: Basic concepts, analysis methods and practical use. vol. 1. 2nd edition. Berlin, Germany:Springer-Verlag, 1997

共引文献91

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部