期刊文献+

简析内网渗透过程及防御措施 被引量:2

Brief Analysis of Internal Network Penetration Process and Defense Measures
下载PDF
导出
摘要 随着信息化建设的发展与局域网的普及,企业局域网的各种核心数据及客户信息都存放在企业的数据库中,其中包括企业的核心生产技术、生产数据和企业内部信息等,由此可以看出企业的网络安全相当重要.主要论述内网渗透过程及相关的防御措施,以此给企业网络管理人员提出相关建议. With the development of information construction and the popularization of LAN,most of the core data and customer information of enterprises are stored in the database of enterprises,including the core production technology,production data and enterprise internal information,etc.,from which it can be seen that the network security of enterprises is how important.This paper mainly discusses the process of internal network penetration and relevant defense measures,so as to give relevant Suggestions to enterprise network managers.
作者 徐过 李双远 XU Guo;LI Shuangyuan(Information Service Center,Jilin Institute of Chemical Technology,Jilin 132022,China;School of Information and Control Engineering,Jilin Institute of Chemical Technology,Jilin 132022,China)
出处 《吉林化工学院学报》 CAS 2021年第3期70-77,共8页 Journal of Jilin Institute of Chemical Technology
基金 吉林省职业技术教育学会科研课题(2020XHY195)。
关键词 内网渗透 信息收集 横向渗透 跨域攻击 暴力破解 Network infiltration information collection transverse penetration cross-domain-attack brute force
  • 相关文献

参考文献5

二级参考文献30

  • 1方东权,杨岿.校园网网络安全与管理[J].网络安全技术与应用,2005(3):51-52. 被引量:27
  • 2王宏伟.网络安全威胁与对策[J].科技创业月刊,2006,19(5):179-180. 被引量:87
  • 3夏丹丹,李刚,程梦梦,于亮.入侵检测系统综述[J].网络安全技术与应用,2007(1):35-36. 被引量:37
  • 4ALMENAREZ F, MARIN A, DIAZ D, et al. Developing a model for trust management in pervasive devices[A]. Bob Werner, ed. Proc of the 3rd IEEE Int'l Workshop on Pervasive Computing and Communi- cation Security (PerSec 2006)[C]. Washington. USA. 2006. 267-272.
  • 5ALMENAREZ F, MARIN A, CAMPO C, et al. TrnstAC: trust-based access control for pervasive devices[A]. LNCS 450[C]. Berlin, Ger- many, 2005. 225-238.
  • 6AHAMED S I, SHARMIN M. A trust-based secure service discovery (TSSD) model for pervasive computing[J]. Journal of Computer Commu- nications, 2008,31 ( 18):4281-4293.
  • 7AHAMED S I, HAQUE M M. Design, analysis, and deployment of omnipresent formal trust model (b-TM) with trust bootstrapping for per- vasive environments[J]. Journal of Systems and Software, 2010, 83(2): 253-270.
  • 8TAHERIAN M, JALILI R, ABOLHASSANI H, et al. PTO: a trust ontology for pervasive environments[A]. IEEE AINA-2008 Interna- tional Conference[C]. Gino Wan, Okinawa, Japan, 2008.301-306.
  • 9HE R, N1U J W, ZHANG G W. CBTM: a trust model with uncertainty quantification and reasoning for pervasive computing[A]. LNCS 3758[C]. Berlin, Germany, 2005. 541-552.
  • 10MELAYE D, DEMAZEAU Y. Bayesian dynamic trust model[A]. LNCS 3690[C]. Berlin, Germany, 2005. 480-489.

共引文献15

同被引文献12

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部