期刊文献+

基于PKI的认证欺骗检测及日志记录系统研究

Research of PKI-based Authentication Deception Detection and Logging System
下载PDF
导出
摘要 高校校园网是一个业务复杂的大规模局域网,面临着网络安全挑战,我们认为当前网络攻击或者破坏者通常不会使用自己真实的IP地址、MAC地址、用户名或口令去实施攻击,故网络安全防范监测和取证是目前高校校园网安全的重要任务。为此文章提出采用PKI(Public Key Infrastructure)技术,进行基于PKI的认证欺骗检测及日志记录系统的研究,对高校校园网安全保障实施具有一定的启发和指导意义。 Campus network is a complex business, large-scale LAN, facing the challenges of network security, we believe that the current network attacks or destroyer typically do not use your real IP address, MAC address, user name or password to carry out attacks,so network security prevention monitoring and forensics is the important task of the campus network security. In this paper, by using the technology of PKI(public key infrastructure) and research based on PKI authentication spoofing detection and logging system, it will be Inspiration and guiding significance to the implementation of the security of campus network in Colleges and universities.
出处 《信息通信》 2016年第8期103-105,共3页 Information & Communications
基金 兰州交通大学青年科学基金资助项目(项目编号:2014027)
关键词 PKI 校园网 欺骗检测 日志记录 Public Key Infrastructure(PKI) Campus Network Deception Detection Logging
  • 相关文献

参考文献4

二级参考文献70

  • 1袁晖.基于X.509证书的身份认证机制的研究[J].大众科技,2006,8(2):174-175. 被引量:7
  • 2Nash A,Duane W,Joseph C,et al.张玉清译.公钥基础设施(PKI)-实现和管理电子安全[M].北京:清华大学出版社,2002-12.
  • 3Housley R,Ford W.Internet X.509 Public Key Infrastructure Certificate and CRL Profile[S].IETF RFC2459,1999-01.
  • 4Adams C,Farrell S.Internet X.509 Public Key Infrastructure Certificate Management Protocols[S].IETF RFC2510,1999-03.
  • 5Barman S.段海新,刘彤译.编写信息安全策略[M].北京:人民邮电出版社,2002-11.
  • 6Bruce S.吴世忠,祝世雄,张文政译.应用密码学[M].北京:机械工业出版社,2000-01.
  • 7Terence Spies. Public Key Infrastructure[ M]. Computer and Information Security Handbook. San Francisco: Morgan Kaufmann, 2009.
  • 8Hartini S,Zaiton H. The application of the digital signature law in securing internet banking: Some preliminary evidence from Malaysia[ J]. Proce-dia CompuleT Science, 2011, 3: 248 -253.
  • 9Baibara M. Electronic government, concepts, methodologies, tools, and applications [ J ]. Government Information Quarterly, 2010,27 ( 1) : 109 -110.
  • 10Taekyoung K. Privacy preservation with X.509 standard certificates[J].Information Sciences, 2011,181 (13) : 2906 -2921.

共引文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部