期刊文献+

网络扫描隐蔽性分析 被引量:2

On the Concealment of Network Scanning
下载PDF
导出
摘要 各种不同的网络扫描方法,其隐蔽性和效率根据不同的原理而各不相同。同种扫描也可以采用不同的使用策略和方法而改变其隐蔽性。分析了各种网络扫描的隐蔽性,提出了对付隐蔽扫描可以采取的一些通用策略,并针对不同的扫描方式给出相应的对策。 Different network scanning methods have different concealment and efficiency. Even the same can has different concealment under different conditions. In this paper we analyze the concealment of different kinds of network scan, and then put forward some general policies to deal with it. At last, we introduce the specific methods to different scan type.
出处 《计算机应用研究》 CSCD 北大核心 2003年第12期93-95,共3页 Application Research of Computers
基金 国家高技术研究发展计划("863"计划)(2001AA142100) 教育部博士点基金(2002CT1101) 航空科学基金(02F53035) 西工大青年科技创新基金资助项目(020101)
关键词 网络扫描 隐蔽性分析 Network Scanning Concealment Analyzing
  • 相关文献

参考文献1

二级参考文献12

  • 1Debar, Hervé and Dacier et al. Towards a Taxonomy of Intrusion Detection Systems. Zurich, Switzerland, IBM Research, 1998(http: ∥www. zurich. ibm. com/).
  • 2T H Ptacek and T N Newsham. Insertion, evasion, and denial of service: Eluding Network Intrusion Detection.Technical report, Secure Networks Inc., January 1998.
  • 3http:∥www. phrack. org.
  • 4D Malkhi and M Reiter. Unreliable Intrusion Detection in Distributed Computations, Proc. of the 10th Computer Security Foundations Workshop, Rockport, MA, June 1997:116 ~ 124.
  • 5Paxson V . Bro: A System for Detecting Network Intruders in Real- Time. In Proc. of the 7th USENIX Security Symposium, San Antonio, TX, January 1998.
  • 6The LIDS Project. http: ∥www. lids. org.
  • 7Snapp S R, Brentano J, Dias G V, et al. DIDS - Motivation,Architecture and an Early Prototype, Proc. of the 14th National Computer Security Conference, Washington, D C.,Oct. 1991:167 ~ 176.
  • 8Eugene H Spafford and Diego Zamboni. Intrusion detection using autonomous agents. Computer Networks, October2000, 34(4): 547 ~ 570.
  • 9James P Anderson. Computer Security Threat Monitoring and Surveillance. Technical Report, James P Anderson Co.,Fort Washington, PA., 1980.
  • 10Dorothy Denning. An Intrusion Detection Model. IEEE Transactions on Software Engineering, 1987, 13 (2): 222 ~232.

共引文献12

同被引文献4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部