期刊文献+

网络入侵防御系统的分析与设计 被引量:3

Network Intrusion Prevention System Analysis and Design
原文传递
导出
摘要 随着网络应用的普及与多元化,网络的安全问题逐渐被人们所重视,目前的防火墙、入侵检测系统已经成为广泛应用的安全防御解决方案,但是由于他们自身存在的一些不足,导致不能对网络进行全面的防护。文章文在研究和分析目前常见的网络攻击方法的基础上,设计了一种网络入侵防御系统,给出了相应的关键技术设计与实现。 With the popularity of network applications and diversification,network security issues have been gradually paying attention to it,the current firewall,Intrusion Detection System has become a widely used solution for security and defense,but the existence of their own as a result of a number of shortcomings,can not lead to a comprehensive network protection. The article text is currently in the research and analysis methods common network attacks,based on the design of a network intrusion defense system,given the appropriate design and implementation of key technologies.
作者 张秀梅
出处 《信息与电脑(理论版)》 2009年第7期1-2,共2页 China Computer & Communication
关键词 入侵检测 网络安全 入侵防御 intrusion detection,network security,intrusion prevention
  • 相关文献

参考文献4

二级参考文献25

  • 1崔晓垣.网络入侵防御系统研究[J].信息安全与通信保密,2005,27(3):109-111. 被引量:7
  • 2.[EB/OL].http://kdd. ics. uci. edu/databases/kddcup99/kddcup99. html,.
  • 3Wenke L. A Data Mining Framework for Building Intrusion Detection Models. In IEEE Symposium on Security and Privacy,1999
  • 4Lee W,Stolfo S J, Mok K W. Mining in a data-flow environment:experience in intrusion detection. submitted for publication, 1999
  • 5Portnoy L,Eskin E,Stolfo S J. Intrusion detection with unlabeled data using clustering. In: Proc. of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001). Philadelphia: ACM Press,2001 (11)
  • 6Li Xiangyang. Clustering and Classification Algorithm for Computer Intrusion Detection: [PhD. ]. Arizona State University,2001.12
  • 7Equihua M. Fuzzy clustering of ecological data J. Ecol,1990,78:561~567
  • 8David Newman, Joel Snyder, Rodney Thayer. Crying Wolf: False Alarms Hide Attacks[EB/OL]. http://www.nwfusion.com/techinsider/2002/0624security1.html, 2002.
  • 9Vandyke SoftwareTM. Survey Shows How IT Perceives & Responds to Constantly Changing Security Threates[EB/OL]. http://www.vandyke.com,2003.
  • 10Andrew Plato. What is an Intrusion Prevention System[EB/OL].http://www.anitian.com/corp/papers/ips_defined.pdf,2004.

共引文献43

同被引文献7

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部