期刊文献+

主机攻击分析及安全防护初探

Analysis of host attacking and its security protection
下载PDF
导出
摘要 基于攻击者攻击主机的基本步骤 ,对其中关键步骤在攻击过程中所担当的任务进行了分析 ,总结出了若干攻击特征 .根据所给出的攻击特征 ,设计了一个主机监测系统 ,讨论了该监测系统各组成要素的主要功能及监控机制 .通过主机监测系统对攻击的监控 ,增强了主机的实时安全防护能力 。 According to the steps of host attacking, the crucial steps during the process of attacking were analyzed and some attacking features were summarized. Based on the attacking features, host supervision system was designed and the main functions of each element of the system and its supervision mechanism were discussed. By monitoring the host supervision system, the ability of real-time security protection of host was strengthened and the security of host was enhanced.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2004年第3期77-79,共3页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
关键词 计算机安全 主机攻击 攻击步骤 主机监测 SHELL computer security host attacking attacking steps host supervision shell
  • 相关文献

参考文献2

  • 1[1]Cunningham R K, Lippmann R P, Webster S E. Detecting and displaying novel computer attacks with Macroscope. IEEE Trans. Systems, Man & Cyber, 2001, 31(4): 275~281
  • 2[2]Joel S, McClure S, Kurtz G. Hacking exposed: network security secrets and solutions.Beijing:Tsinghua University Press, 2002.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部