期刊文献+

黑客入侵防范体系的设计与实现 被引量:4

Design and Implementation of the Precaution System Against Hacker Attack
下载PDF
导出
摘要 在分析黑客防范体系理论模型及相关研究的基础上,论述了黑客入侵防范体系的组成部件及若干关键单元技术,给出一种以评估为基础,以策略为核心,以防护、侦测、响应和恢复技术为工具,以管理为落实手段的动态、多层次的黑客入侵防范体系模型—EPPDRR-SM模型,基于该模型,实现了一个实用的黑客入侵防范体系。目的是为我国黑客入侵防范体系的研究、设计与实现提供一个参考模型。实验证明,该体系对黑客攻击具有较好的防护性能。 The article discusses the structure and several key unit technologies of the precaution system against hacker attacks, and provides a new kind of dynamic and multi-level network security model—EPPDRR-SM model,which bases on evaluation,takes the policy as core, protection, detection, response and restoration technologies as tools, management as the implementing measure. The purpose of the article is to provide the reference model for the research, design and implementation of the precaution system against hacker attack. The result of the experiments indicates that this system has effective performance against hacker attack.
出处 《计算机工程》 CAS CSCD 北大核心 2003年第12期34-35,44,共3页 Computer Engineering
基金 中国科学知识创新工程重大项目(KJCX1-90) 国家重点基础研究发展规划项目("973"计划)(G1999035806)
关键词 黑客入侵 防范体系 安全策略 安全管理 陷阱网络 入侵取证 Hacker attack Precaution system Security policy Security management Honeynet Forensic
  • 相关文献

参考文献9

  • 1石文昌,孙玉芳.信息安全国际标准CC的结构模型分析[J].计算机科学,2001,28(1):8-11. 被引量:9
  • 2.中华人民共和国推荐标准.计算机信息系统安全保护等级划分准则[Z].中国国家质量技术监督局,1999.(9).
  • 3.中华人民共和国推荐标准.信息技术-安全技术-信息技术安全评估准则-第1部分:安全功能要求[Z].中国国家质量技术监督局,2001.(3).
  • 4何德全.新的世纪召唤新的INTERNET安全范式[J].信息安全与通信保密,2001(12):10-15. 被引量:8
  • 5Information Technology Security Evaluation Criteria (ITSEC)(Version 1.2).Office of Official Publications of the European Communities,1991-06.
  • 6Feustel E A,Mayfield T.The DGSA: Unmet Information Security Challenges for Operating System Designers.ACM Operating Systems Review, 1998-01,32(1):3-22.
  • 7Biondi P. LIDS- HOWTO.http://www.lids.org/lids-howto/,2000-03.
  • 8Smalley S, Fraser T.A Security Policy Configuration for the Securtiy-Enhanced Linux. Technical Report.NAI Labs, 2001-01.
  • 9Trusted Computer System Evaluation Criteria (TCSEC),US DoD 5200.28-STD, 1985-12.

二级参考文献5

  • 1[1]Department of Defense, Department of Defense Trusted Computer System Evaluation Criteria. DoD 5200. 28-STD, Washington, DC, Dec. 1985
  • 2[2]The Trust Technology Assessment Program,The Computer Security Evaluation Frequently Asked Questions (V3),National Security Agency, 1999. Available at: http://www. radium. ncsc. mil/tpep/process/faq. html
  • 3[3]The International Organization for Standardization,Common Criteria for Information Technology Security Evaluation-Part 1: Introduction and General Model, ISO/IEC 15408-1:1999(E), 1999
  • 4[4]The International Organization for Standardization,Common Criteria for Information Technology Security Evaluation-Part 2: Security Functional Requirements, ISO/IEC 15408-2:1999 (E), 1999
  • 5[5]The International Organization for Standardization,Common Criteria for Information Technology Security Evaluation-Part 3: Security Assurance Requirements, ISO/IEC 15408-3:1999(E), 1999

共引文献15

同被引文献19

  • 1高献伟,郑捷文,杨泽明,许榕生.智能网络取证系统[J].计算机仿真,2006,23(3):95-98. 被引量:5
  • 2G.Das,K.I.Lin,H.Mannila.Rule Discovery from Time series[A].Proceeding of the 4th International Conference on Knowledge Discovery and data mining[C].1998:16-22.
  • 3C.S.Chao,D.L.Yang.A LAN Fault Diagnosis System[J].Computer Communications,2001,24(14):1439-1451.
  • 4J.B.Peter,A.D.Richard.Time Series:Theory and Methods[M].Springer-Verlag,New York,2001.
  • 5NIKSUN,Inc.Network Intrusion Forensic System White paper[R].2003.
  • 6耿国华 康华.人工智能在入侵检测技术中的应用[J].西北大学学报,2003,8(2).
  • 72004年全国信息网络安全状况调查报告[DB].http://www.mps.gov.cn.
  • 8中国网络犯罪的现状及特点[N].中国检察日报.2004-7-3.
  • 9Antti Peltonen,Teemupekka Virtanen,Esa Turtiainen.Centralized Management of Virtual Security Zones in IP Networks[A].ACNS 2004[C].2004.91-102.
  • 10Jae Seung Lee,Sang Choon Kim.Design of the Decision Support System for Network Security Management to Secure Enterprise Network[A].ISC 2001[C].2001.497-511.

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部