期刊文献+

面向防御的网络欺骗技术研究 被引量:2

Research on Defense-oriented Network Spoofing Technology
下载PDF
导出
摘要 随着现代电子技术的迅猛发展,互联网不但成为国际信息传播的重要载体,而且早已渗透到社会生活的方方面面,在人们的生产与生活中发挥着日益显著的作用。但是,自互联网问世以来,信息泄露事件时有发生,信息安全问题突出,网络安全形势日益严峻。基于此,越来越多的人希望寻求更加有效的网络安全防御手段,以确保网络信息的安全性与可靠性。基于此,笔者试分析常见的网络欺骗方式,以及相关的网络欺骗防御技术,希望能够不断提升网络欺骗防御技术水平,促进信息安全与资源共享的协调发展。 With the rapid development of modern electronic technology,the Internet has not only become an important carrier of international information dissemination,but also has penetrated into all aspects of social life,playing an increasingly prominent role in people's production and life.However,since the advent of the Internet,information leakage incidents have occurred,information security issues have become prominent,and the network security situation has become increasingly severe.Because of this,more and more people are looking for more effective cybersecurity defenses to ensure the security and reliability of network information.This paper attempts to analyze common spoofing methods and related spoofing defense technologies,hoping to continuously improve the level of spoofing defense technology,promote the coordinated development of information security and resource sharing.
作者 罗婷婷 Luo Tingting(Jiangxi Police College,Nanchang Jiangxi 330103,China)
机构地区 江西警察学院
出处 《信息与电脑》 2019年第21期186-187,共2页 Information & Computer
基金 江西警察学院2018年度院级科研项目研究成果“面向防御的网络欺骗技术研究”(项目编号:2018YB005)
关键词 网络欺骗 常见方式 防御技术 cyber spoofing common methods defense technology
  • 相关文献

参考文献2

二级参考文献17

  • 1程杰仁,殷建平,刘运,钟经伟.蜜罐及蜜网技术研究进展[J].计算机研究与发展,2008,45(z1):375-378. 被引量:35
  • 2曹爱娟,刘宝旭,许榕生.网络陷阱与诱捕防御技术综述[J].计算机工程,2004,30(9):1-3. 被引量:27
  • 3Spitzner L. Honeypots: Tracking Hackers[M]. Boston: Addison-Wesley, 2003:73 -86.
  • 4Spitzner L. Honeypots: Catching the Insider Threat[C]//Proceedings of the 19^th Annual Computer Security Applications Conference, 2003:170 - 179.
  • 5Spitzner L. Problems and Challenges with Honeypots[ EB/OL]. http: //www. security focus. com/infocus/1757, 2004.
  • 6Provos N. A Virtual Honey-pot Framework[ EB/OL]. http://www. usenix. org/event/sec04/tech/full _ papers/provos/provos _ html, 2004.
  • 7Spitzner L. Open Source Honeypots: Learning with Honeyd[EB/OL].http://www.security focus.com/infocus/1659, 2003.
  • 8Netsec. Specter Intrusion Detection System[ EB/OL]. http://www. specter. com, 2004.
  • 9Recourse Technologies Inc. Mantrap: A Secure Deception System[ EB/OL]. http://www.recourse.com, 2001.
  • 10The Honeynet Project. Know Your Enemy:Learning about Security Threats(2^nd Edition)[M]. Boston: Addison-wesley, 2004.

共引文献54

同被引文献18

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部