期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
防火墙上H.323协议的兼容
1
作者 郁郎 《信息网络安全》 2003年第5期46-47,共2页
H.323是一种网络上进行多媒体通讯的标准,包括实时的语音、视频和数据的传输,它规定了多媒体通讯的成员、各成员之间的通讯协议,以及各种处理过程,实现了语音(IP Phone)、视频(可视电话)
关键词 防火墙 H.323协议 多媒体通讯 网络安全 计算机网络
下载PDF
Intrusion detection using rough set classification 被引量:16
2
作者 张连华 张冠华 +2 位作者 郁郎 张洁 白英彩 《Journal of Zhejiang University Science》 EI CSCD 2004年第9期1076-1086,共11页
Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learn... Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of'IF-THEN' rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set). 展开更多
关键词 Intrusion detection Rough set classification Support vector machine Genetic algorithm
下载PDF
防火墙与H.323协议
3
作者 郁郎 《信息安全与通信保密》 2003年第8期32-34,共3页
关键词 防火墙 H.323协议 多媒体通讯 地址转换
原文传递
虚拟化技术,让数据更安全 被引量:3
4
作者 夏斌 金亮 郁郎 《信息安全与通信保密》 2009年第9期83-85,共3页
论文介绍了数据安全,尤其是数据防泄漏在信息安全领域中的重要性,分析了当前应用较为广泛的几种数据防泄漏技术机制,总结了它们各自的优缺点,并对业界最新出现的以虚拟化技术为基础的数据防泄漏理念进行了重点介绍,展望了其在数据防泄... 论文介绍了数据安全,尤其是数据防泄漏在信息安全领域中的重要性,分析了当前应用较为广泛的几种数据防泄漏技术机制,总结了它们各自的优缺点,并对业界最新出现的以虚拟化技术为基础的数据防泄漏理念进行了重点介绍,展望了其在数据防泄漏领域将要发挥的重要作用。 展开更多
关键词 数据安全 防泄漏 虚拟化 加解密
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部