期刊文献+

浅析计算机数据库入侵检测技术 被引量:6

Analysis of computer database intrusion detection technology
下载PDF
导出
摘要 随着科学文化的发展,电子科技的进步,计算机越来越得到了广泛的应用,人们不仅用它来处理个人的事情,也会在计算机中储存一些个人的信息资料,然而任何事情总会两面性,在给人们带来方便的同时,也不可避免的会出现各种各样的安全问题。为了保障计算机数据库中个人资料的安全性计算机数据库入侵检测技术应运而生。在防火墙以及数据加密中起着关键的保护作用。 With the development of science and culture,electronic technology,computer is more and more widely used,people do not only use it to deal with personal,will also store some personal information in a computer,however,any things Two sides,brings convenience at the same time,security problems have inevitably there will be a variety of.For the safety of the computer database of personal data protection in a computer database intrusion detection technology emerge as the times require.Plays a key protective role in the firewall and data encryption.
作者 蔡苏亚
出处 《电子测试》 2013年第9X期72-73,共2页 Electronic Test
关键词 计算机数据库 安全 入侵检测技术 computer database security intrusion detection technology
  • 相关文献

参考文献6

二级参考文献15

  • 1文俊浩,徐玲,李立新,徐传运.安全增强的数据库系统的模型构建[J].计算机应用,2005,25(8):1734-1736. 被引量:7
  • 2Axelsson S.Aspects of the Modeling and Performance of Intrusion Detection. Sweden. Chalmers University of Technology, 2000, 21 (7): 45-47.
  • 3Frank S.Rietta. Application Layer Intrusion Detection for SQL injection. Proceedings of the 44th annum southeast regional conference Mar.2006:531-536.
  • 4ZSEBY T, FOKUS F, MOLINA M, et al. Sampling and Filtering Techniques for IP Packet Selection [ EB/OL ]. [2007 - 01 - 20]. http://www, ieff. org/html, charters/psamp-charter, html.
  • 5HELMAN P, BHANGOO J. A Statistically Base System for Prioritizing Information Exploration Under Uncertainty [ J ]. IEEE Transactions on Systems, Man and Cybernetics, Systems and Humans, 1997, Part A:27.
  • 6STEFANOS M, MARVIN C, DAN Z, et al. A Data Mining Analysis of RTID Alarms [J]. Computer Networks, 2000, 34,571 - 577.
  • 7ALBUS J S. A New Approach to Manipulator Control[ J ]. Trans ASME J Dyn Syst Meas Contrl, 1975.97:220 -227.
  • 8SRILATHA C. , AJITH A. , THOMAS P. Feature Deduction and Ensemble Design of Intrusion Detection System [J]. Computer & Security, 2004(9) :26 -32.
  • 9(美)RebeccaGurleyBace著,陈明奇等.入侵检测[M]人民邮电出版社,2001.
  • 10何昊,何剑,刘剑平.计算机网络攻击的主要防治措施[J].中国科技信息,2010(21):99-99. 被引量:11

共引文献56

同被引文献9

引证文献6

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部