期刊文献+

大数据抵御APT攻击的可行性研究 被引量:1

下载PDF
导出
摘要 通过分析APT攻击特征以及"大数据"技术实践效能等相关内容,构建以"大数据"技术为核心的抵御APT攻击方案,经实践验证,该方案在数据网络环境中的执行具备一定的可行性,能够起到维系网络系统安全运作的重要作用。本文就针对大数据抵御APT攻击的可行性方面进行探究。
作者 王永
出处 《电子制作》 2015年第5X期160-,共1页 Practical Electronics
  • 相关文献

参考文献4

二级参考文献26

  • 1RSA. RSA security brief: Mobilizing intelligent security operations for advanced persistent threats [OL]. 2011 [2013- 07-11]. http=//www, eme. corn/utilities/search, esp.
  • 2Tankard C. Advanced persistent threats and how to monitor and deter them[J]. Network Security, 2011 (8): 16-19.
  • 3Li F, Lai A, Ddl D. Evidence of advanced persistent threat: A case study of malware for political espionage [C] //Proc of the 6th Int Conf on Malicious and Unwanted Software (MALWARE 2011). Piscataway, NJ: IEEE, 2011:102-109.
  • 4Kurtz G. Operation aurora hit Google, others [OL]. 2010- 01-14 [2013-07-11]. http://siblog, mcafee, eomleto/operation-% E2.
  • 5McAfee Labs and McAfee Foundstone Professional Services. Protecting your critical assets: Lessons learned from operation Aurora [OL]. 2011-08-03 [2013-07-11]. http:// bit. Iy/xSDUXE.
  • 6McMillan R. Siemens: Stuxnet worm hit industrial systems [OL]. (2010-09-14) [2013-07-11]. http://www, computervcorld. com/s/article/9185419[SiemensStuxnetworm hit industrial systems.
  • 7Falliere N, Murchu L O, Chien E. W32. Stuxnet Dossier [OL]. (2011-03-09)[2013-07-12]. http://www, h4ekr, us/ library/Documents/ICS _ Events/Smxnet% 20Dossier% 20 (Symantec) %20vl. 4. pdf.
  • 8Langner R. Stuxnet: Dissecting a cyberwarfare weapon [J]. Security & Privacy, 2011, 9(3): 49-51.
  • 9Farwell J P, Rohozinski R. Stuxnet and the future of cyber war[J]. Survival, 2011. 53(1): 23-40.
  • 10CyberattaeksG E. Night dragon[OL]. (2011-02-10) [2013- 07-12]. http://www, mcafee, com/tw/aboutlnight-dragon. aspx.

共引文献25

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部