期刊文献+

一种通用的网络安全防御系统模型分析 被引量:4

Analysis of a Common Network Security Defence System Model
下载PDF
导出
摘要 网络安全是一个综合的立体的概念。提出了一个通用的网络安全防御系统模型 。 The conception of network security is synthetic and complete.In this paper,we put forward a common network security defence system model and disscussed the related technology and hotpot research on firewall and instrusion detection system in details.
机构地区 武汉理工大学
出处 《武汉理工大学学报》 CAS CSCD 2002年第11期83-86,共4页 Journal of Wuhan University of Technology
关键词 网络安全 防御系统 模型 安全策略 防火墙 分布式入侵检测系统 异常检测 模式匹配 security policy firewall distributed instrusion detection system anomaly detection pattern match
  • 相关文献

参考文献1

二级参考文献9

  • 1[1]Denning D E. An Intrusion-detection model[J]. IEEE Transactions on software engineering, 1987,13(2):222-232.
  • 2[2]Liepins G E, Vaccaro H S. Intrusion detection: its role and validation[J]. Computers & Security, 1992,11:347-355.
  • 3[3]Vaccaro H S, Liepins G E. Detection of anomalous computer session activity[EB/OL]. http:∥dblp.uni-trier.de/db/conf/sp/sp1989.html.2000-09-15.
  • 4[4]Kumar S. Classification and detection of computer intrusions[D]. West Lafayette: Purdue University,1995.
  • 5[5]Debar H, Dacier M. Towards a taxonomy of intrusion-detection systems[J]. Computer Networks, 1999,31:805-822.
  • 6[6]Ravi S. Sandhu. Authentication, access control, and intrusion detection[J]. IEEE Communications, 1994,32(9):40-48.
  • 7[7]Bass T. Intrusion detection systems and multisensor data fusion[J]. Communications of the ACM, 2000,43(4):99-105.
  • 8[8]Porras P A,Kemmerer R A. A rule-based intrusion detection approach[A]. In: Gove R ed. Proceedings of the Eighth Annual Computer Security Applications Conference[C]. San Antonio: IEEE Computer Society Press, 1992.220-229.
  • 9[9]Lachiche N. Naive bayesian classifier [EB/OL]. http:∥www.cs.bris.ac.uk/research/ Machine Learning/1BC/ilp99/node2.html. 1999-06-15.

共引文献13

同被引文献17

  • 1王志海.网络安全发展趋势探讨[J].信息安全与通信保密,2004(6):24-25. 被引量:3
  • 2戴种坤 唐三平.VPN与网络安全[M].北京:电子工业出版社,2002.114-141.
  • 3Heinanen G A,Tulin M P. A Framework for IP Based Virtual Private Networks [J]. IEEE Communication Magazine, 2000,24(12) :34-37.
  • 4Car1ton R Davis 李成坤译.IPsec:VPN的安全实施[M].北京:清华大学出版社,2002.266-274.
  • 5Zhong Luo, Xia Hongxia, Yuan Jingling. Study and Improvement on Hierarchical Algorithm of Association Rule, Data Mining and Knowledge Discovery: Theory, Tools, and Technology Ⅳ[J]. Proceedings of SPIE, 2002, 4730(4):88-93.
  • 6Han J, Pei J, Yin Y. Mining Frequent Patterns Without Candidate Generation[A]. Proc ACM-SIGMOD 2002[C]. Texas:ACM, 2000.1-12.
  • 7Quinlan R J. Induction on Decision Trees[J]. Machine Learning, 1986,1(1) :81-106.
  • 8陆建德,李煜.虚拟专用网VPN网关的设计与实现[J].微计算机应用,2000,21(2):65-68. 被引量:3
  • 9师成江,汪海航,谭成翔.基于IPSec的安全VPN模型研究[J].计算机应用研究,2001,18(6):75-77. 被引量:22
  • 10邹仕洪,阙喜戎,龚向阳,程时端.基于数据挖掘与CIDF的自适应入侵检测系统[J].计算机工程与应用,2002,38(11):184-186. 被引量:13

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部