期刊文献+

网络环境治理中常见的典型网络攻击及防护

下载PDF
导出
摘要 在数据通信过程中,由于各种不安全因素会导致信息泄密、信息不完整不可用等问题,因此在通信过程中必须保证网络安全。本文就针对常见的网络攻击及防护策略等内容进行了简要的分析和探讨。
作者 夏保昆
出处 《区域治理》 2019年第33期141-143,共3页 REGIONAL GOVENANCE
  • 相关文献

参考文献5

二级参考文献42

  • 1国家互联网应急中心.中国互联网网络安全报告[R].北京:国家互联网应急中心,2011.
  • 2ZHANG Yin , VERN P. Detecting backdoors[ C ]// Proc of the 9th USENIX Security Symposium. Las Vegas: USEN1X, 2000: 543-554.
  • 3DUSI M, CROTTI M, GR1NGOLI F, et al. Tunnel hunter: detecting application-layer tunnels with statistical finger printing [ J ]. Compu ter Networks: The International Journal of Computer and Tele- communications Networking Archive ,2009,53 ( 1 ) : 81 - 97.
  • 4COLIN P, KEMAL H. Trojan detection using MIB-based IDS/IPS system[ C]//Proc of Information, Communication and Automation Technologies. Singapore : IEEE Conference Publication, 2009 : 1 - 5.
  • 5LIU Ting, GUAN Xiao-gong, ZHENG Qing-hua, et al. Prototype demonstration: Trojan detection mad defense system [ C ]// Proc of IEEE Consumer Communications and Networking Conference. Las "Vegas : IEEE Conference Publication, 2009 : 1-2.
  • 6MOFFIE M, CHENG W, KAELI D, et al. Hunting Trojan horses [ C ]//Proc of the 1st Workshop on Architectural and Sytem Support for Improring Software Dependability. [ S. 1. ] :ACM Press,2006.
  • 7Spybot-Search and destroy[ EB/OL]. (2011-09-15 ) [ 2012-02-05 ]. http ://www. safer-networking, org/.
  • 8NICO G, MARIUS K, KONRAD R, et al. Active learning for net- work intrusion detection[ C]//ProC of the 2rid ACM Workshop on Se- curity and Artificial Intelligence. New York : ACM Press 2009 : 47-54.
  • 9焦李成,刘芳,缑水平,等.智能数据挖掘与知识发现[M].西安西安电子科技大学出版社,2006.
  • 10CHRISTOPHER J, BURGES C. A tutorial on support vector machine for pattern recognition [ J ]. Knowledge Discovery and Data Mi ning, 1998, 2(2) :235-244.

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部