期刊文献+

网络已知攻击类型的防御方法 被引量:4

Defensive Methods on the Type of Known Network Attacks
下载PDF
导出
摘要 随着网络的发展,网络的安全问题逐渐被人们所认识。网络攻击行为的不断发生,促使网络安全系统的诞生。该文提出的一个分布式入侵检测模型,能够对常见的具有攻击特征的入侵行为进行防御,同时在设计模型时,注意了标准化的设计,因此系统具有很高的升级性、可扩充性和适应性。最后,给出的端口扫描、嗅探器和IP欺骗防御代理设计,说明了如何进行标准化的代理设计满足模型目标。 With the development of the computer network,more and more people concern network security.Network security systems have been developed because network attacks happen everyday.A Distributed Intrusion Detection System Model is put forward in this paper to defend various attacks with certain attack features.At the same time ,great attention is paid to standardized design,so our system has excellent expansibility,scalability and adaptability.Lastly,three defensive agents,which are port-scanning agent ,sniffer agent and IP spoofing agent are designed in detail in order to explain how to conduct a standardized agent to meet our model objective.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第21期171-174,共4页 Computer Engineering and Applications
关键词 分布式入侵检测模型 端口扫描 嗅探器 IP欺骗 网络安全 Distributed Intrusion Detection System Model,port-scanning,sniffer,IP spoofing
  • 相关文献

参考文献7

  • 1王灏,王换招.端口扫描与反扫描技术[J].微机发展,2001,11(5):60-63. 被引量:10
  • 2Vern Paxson.Bro:a system for detection network intruders in realtime[J].Computer Science, 1999.
  • 3Richard Feiertag.Intrusion detection inter-component adaptive negotiation[J].Computer Science,2000.
  • 4Shaiful Jahari Hashim.Computer Network Intrusion Detection Software Development[J].IEEE, 2000.
  • 5Stefanos Manganaris.A data mining analysis of RTID alarms[J].Computer Science,2000.
  • 6Peter Mell.A deniM-of-service resistant intrusion detection architecture[J].Computer Science ,2000.
  • 7Ming-Yuh Huang.A large scale distributed intrusion detection framework based on attack strategy analysis[J].Computer Science,2000.

二级参考文献6

  • 1Gary R .Wright & W. RichardStevens. TCP/IP详解卷2:实现[M]. 北京:机械工业出版社,2000.
  • 2W. Richard Stevens. TCP/IP详解卷1:协议[M].北京:机械工业出版社,2000.
  • 3Marina del Rey . RFC791 Internet Protocol[M].1981.
  • 4J. Postel . RFC792 Internet Control Message Protocol[M].1981.
  • 5Marina del Rey . RFC793 Transmission Control Protocol[M].1981.
  • 6R. Braden . RFC1122 Requirements for Internet Hosts--Communications Layers[M].1989.

共引文献9

同被引文献8

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部