期刊文献+

网路安全需要主动防护 被引量:1

下载PDF
导出
摘要 首先分析了目前的网络安全现状和现有的网络防护技术,并对这些防护技术做了简单的介绍。分析得出目前的网络防护以被动防护为主,仅是被动的防护不能提供给网络提供最大的安全性,网络需要主动型的防护。
机构地区 中国地质大学
出处 《软件导刊》 2007年第11期117-118,共2页 Software Guide
  • 相关文献

参考文献3

二级参考文献12

  • 1Ray Hunt. Intemet/Intranet firewall security - policy, architecture and transaction services [J]. Computer Communication,1998;21 : 1107 - 1123.
  • 2Ptacek T H. Newsham T N. Insertion, Evasion, and Denial of Service: Eluding Network Intrudion detection[Z]. 1998.
  • 3Ravi S. Sandhu. Authentication, access control, and intrusion detection[J], IEEF. Communications, 1994,32(9) :40 - 48.
  • 4Denning D E. An Intrusion - detection model[J ],IEEE Transactions on software engineering, 1987,13(2) :222 - 231.
  • 5Abdelaziz Mounji,Langtuages and Tools for Rule-Based Ditributed Intrusion Detection. The degree of Doctor of Computer Science Department of Facultes University,Belgioum, 1997.9.
  • 6Techniques Adopted By ' System Grackers' When Attemption To Break Into Corporate or Sensitive Private Network[M]. By the consultants of the Network ,Security Solution Ltd. Front -line Information Security Team(Fist), 1998,12.
  • 7蒋建春 冯登国.网络入侵检测原理与技术[M].北京:国防工业出版社,2000..
  • 8High-Performance Communication Networks.Jean Walrand,Pravin Varaiya,2nd Edition,Morgan Kaufmann Publishers Inc.
  • 9Reference Model for Firewall Technology and its Implications for Connection Signaling.J.Bryan Lyles and Christoph L.Schuba.Proceedings Open Signaling Workshop,Columbia University,NY,October 1996.
  • 10Denning .D.An Inrusion Detection Model ,IEEE Transactions on Software Engineering,1987,13(2)222-232.

共引文献23

同被引文献6

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部