期刊文献+

校园网络安全防御的研究 被引量:2

Research on Campus Network Security Defense
下载PDF
导出
摘要 随着我国信息化建设不断推进,大部分校园已经开始信息化管理。教学和管理都已经离不开校园网,由此看见保障校园网的安全性至关重要。但是目前经常会出现一些恶意病毒对于校园网的安全运行造成极大的威胁。这就要求技术人员建立起有效的安全防御措施。为了提升校园网的安全性,本文首先论述了目前我国校园网的运行现状、隐患和面临的威胁,最后提出了校园信息网络安全防御系统的设计和实现方法。 With the continuous advancement of informationization construction in China,most campuses have begun informa- tionization management. Teaching and management are inseparable from the campus network,which shows that the security of campus network is very important. But at present,there are often some malicious viruses that pose a great threat to the safe operation of campus network. This requires technicians to establish effective security defense measures. In order to improve the security of campus network,this paper first presents the current situation,hidden dangers and threats of campus network opera- tion in China, and finally proposes the design and implementation methods of campus information network security defense system.
作者 吴琳琳 WU Lin-lin(Putian University,Putian Fujian 351100,China)
机构地区 莆田学院
出处 《湖北开放职业学院学报》 2019年第8期128-129,132,共3页 Journal of Hubei Open Vocational College
关键词 校园网络 网络安全 防御系统 campus network network security defense system
  • 相关文献

参考文献3

二级参考文献28

  • 1[1]McClure,Secmbray,Kurtz.黑客大曝光.北京:清华大学出版社.1998.17~19
  • 2[7]张小斌,严望佳.黑客分析和防范技术.北京:清华大学出版社.1999.42~43
  • 3[9]陈永剑.挑战黑客-网络安全的最终解决方案.北京:电子工业出版社.2000.16
  • 4[12]Case J.,Mundy,R.,Partain,D.et al.Introduction to Version 3 Of the Internet-standard Network Management Framework,RFC 2570,April 1999
  • 5[13]M.Wood.Intrusion detection exchange format requirements.internet draft.Internet Engineering Task Force.Jul 1999
  • 6Abbes T, Bouhoula A, Rusinowitch M. Protocol analysis in intrusion detection using decision tree[A]. Proceeding of the International Conference on Information Technology: Coding and Computing (ITCC'04) [C]. Los Alamitos, USA:IEEE Computer Society Press, 2004. 404-409.
  • 7Kruegel C, Toth T. Using decision trees to improve signature-based intrusion detection[A]. Proceeding of RAID'2003 [C]. Berlin Heidelberg New York: Springer-Verlag, 2003.173-191.
  • 8Erbacher R F, Frincke D. Visualization in detection of intrusions and misuse in large scale networks[A]. Proceeding of the International Conference on Information Visualization '2000[C]. Los Alamitos, USA: IEEE Computer Society Press, 2000. 294-299.
  • 9Spitzner L. The honeynet project: Trapping the hackers[J]. IEEE Security and Privacy, 2003, 1(2): 15-23.
  • 10Anderson J P.Computer security thread monitoring and surveillance[R]. Fort Washington, USA: James P Anderson Co, 1980.

共引文献44

同被引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部