期刊文献+

如何保护入侵检测系统的安全 被引量:4

How to Protect Your Intrusion Detection System
下载PDF
导出
摘要 入侵检测系统(IntrusionDetectionSystem)是近年来发展迅速的一种网络安全技术,作为防火墙的有效补充,它在保护电子商务、网上银行、证券交易、政府上网,阻止黑客和内部不满员工的破坏及保护军事机密等方面正发挥着越来越重要的作用。文章讨论了IDS系统的安全架构和安全通信,并且提出了基于PKI的入侵检测系统。它利用了CA认证系统的强大功能,对IDS系统各组件之间或各个IDS系统之间的通信加以认证和加密,有效地保证了IDS系统自身的安全。 Intrusion Detection System is a rapidly developed network security technology As an effective complementarity of firewall,it takes more and more important roles in so many fields such as Ebusinesses, net banks, and net stocks. It also can stop attacks of hackers and dissatisfied employees and protect information security. But like other computer systems, it is also an easy attacked target.Here discusses this situation and loges a solution: an intrusion detection system based on public key infrastructure.It use strong function in CA authentication system,guarantee effectively security of IDS system by authenticating the communication among IDS systems or components in IDS.
出处 《微机发展》 2003年第3期69-71,共3页 Microcomputer Development
  • 相关文献

参考文献3

  • 1孟桂娥,董玮文,杨宇航.公钥基础设施PKI的设计[J].计算机工程,2001,27(6):111-113. 被引量:14
  • 2钟日红 宋建才.Linux黑客防范开放源代码安全指南[M].北京:机械工业出版社,2002.132-139.
  • 3钟日红 宋建才.Linux黑客防范开放源代码安全指南[M].北京:机械工业出版社,2002.132-139.

二级参考文献7

  • 1[1]CCITT Recommendation X.200: Reference Model of Open Systems Interconnection for CCITT Applications. 1984
  • 2[2]CCITT Recommendation X.208:Specification of Abstract Syntax Notation One(ASN.1). 1988
  • 3[3]CCITT Recommendation X.209: Specification of Basic Encoding Rules for Abstract Syntax Notation One(ASN. 1). 1988
  • 4[4]RSA Laboratories. PKCS#8: Private-key Information Syntax Standard Version 1.2.1993-11
  • 5[5]RSA Laboratories. PKCS#7: Cryptographic Message Syntax Standard Version 1.5.1993-11
  • 6[6]CCITT Recommendation X.509/ISO|IEC 9594-8:Information Technology - Open Systems Interconnection - The Directory: Authentication Framework,Annex A
  • 7[7]Hickman K B.The SSL Protocol.Netscape Communications Corp., 1995-02-09

共引文献13

同被引文献20

  • 1左雄.我国农业网站建设研究综述[J].图书与情报,2008(2):54-58. 被引量:15
  • 2王玉锋,范明钰,王绪本,徐海梅.入侵检测系统的研究[J].计算机仿真,2004,21(5):99-102. 被引量:8
  • 3Feiertag R,Kahri C,Porras P ,et a1. A Common Intrusion Specification Language (CISL). 2000
  • 4Porras P, Schnackenberg D. The Common Intrusion Detection Framework Architecture[EB/OL]. http:∥www . isi. edu/gost/cidf/ drafts/ architecture. txt. 1998
  • 5CIDF Working Group . Communication in the Common Intrusion Detection Framework [ EB/ OL]. http:∥www. isi. edu/gost/cidf/ drafts/ com munication. txt. 1998
  • 6荆继武 冯登国.PKI的概念与服务[EB/OL].http//www.chinapki-forum.org.cn/source/zl.htm,.
  • 7韩东海,王超,李群.《入侵检测系统及实例剖析》清华大学出版社.
  • 8王玉荣.《流程管理(第2版)》.机械工业出版社.
  • 9叶颖,严毅.基于通用入侵规范下网络入侵检测系统的实现[D].2010.
  • 10入侵检测系统的安全策略.TechTarget网络.

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部