期刊文献+

基于电子政务的计算机安全系统设计 被引量:3

Design of Computer Security System Based on E-government
下载PDF
导出
摘要 本文主要对安全系统目标以及电子政务安全产生的因素进行了详细介绍,并深入分析了蜜罐核心技术。在此基础上,就电子政务系统特性与需求,设计了基于电子政务的计算机安全系统,并基于双层防火墙、入侵检测系统、蜜罐网络系统网关、蜜罐主机、日志服务器、数据处理模块对模块功能做了进一步深化设计。结果表明,通过基于电子政务的计算机安全系统,促使攻击者连接并进入蜜罐中去,然后收集并详细分析攻击者行为相关信息,通过既有网络安全工具,能够在很大程度上确保电子政务系统的安全性与稳定性。 This paper mainly introduces the goal of security system and the factors of E-government security, and analyzes the core technology of honeypot. On this basis, according to the characteristics and requirements of e-government system, a computer security system based on E-government is designed, which is based on two-layer firewall, intrusion detection system, honeypot network gateway, honeypot host, log server, and so on. The data processing module further deepens the design of the function of the module. The results show that through the computer security system based on e-government,the attacker can be connected and entered into the honeypot, and then the information related to the attackerundefineds behavior is collected and analyzed in detail, and through the existing network security tools. Can ensure the security and stability of E-government system to a great extent.
作者 王瑞 WANG Rui(Xi’an Aeronautical Polytechnic Institute,Xi’an 710089 China)
出处 《自动化技术与应用》 2020年第4期137-140,共4页 Techniques of Automation and Applications
基金 院级课题“新商科”理念下的高职院校电子商务专业人才培养模式的探索与实践(编号18XHJG-006)。
关键词 电子政务 计算机安全 系统设计 E-government computer security system design
  • 相关文献

参考文献4

二级参考文献32

  • 1杨艳,陈性元,杜学绘.基于VPN的安全审计系统的设计与实现[J].计算机工程,2007,33(9):177-179. 被引量:5
  • 2孙宇航.基于网络日志的数据挖掘预处理改进方法[J].系统工程与电子技术,2009,31(12):2994-2997.
  • 3计算机世界.巧用云安[EB/OL].[2014-12.02].http:llwww.dooland.com/magazine/article-70110.html.
  • 4新华时政冲国面临严重境外网络攻击成胁被篡改政府网站增长逾两成[EB/OL].[2014-12.02].http://news.xinhuanet.COm/politics/2013·03/19c_l1.
  • 5SPlTZNERL.Honeypots:追踪黑客[M].邓云佳,译.北京:清华大学出版社,2004:221-230.
  • 6Honeynet Project. Know your enemy: Honeynets [EB/OL] . http://project, honeynet, org.
  • 7Niels Provos and Thorsten Holz. Virtual Honeypots: From Botnet Tracking to Intrusion Detection [M]. 2007,7.
  • 8KSHETRI N.Privacy and security issues in cloud computing:The role of institutions and institutional evolution[J].Telecommunications Policy,2013,37(4-5):372-386.
  • 9ZISSIS D,LEKKAS D.Addressing cloud computing security issues[J].Future Generation Computer Systems,2012,28(3):583-592.
  • 10姚兰,王新梅.基于欺骗的网络主动防御技术研究[J].国防科技大学学报,2008,30(3):65-69. 被引量:20

共引文献27

同被引文献31

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部