期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
系统安全检测的利器——微软精品MBSA
1
作者 双木 《软件指南》 2004年第11期70-71,共2页
现在,大家对系统安全的关注提升到了一个新的高度,那么有没有一个工具能够快速检测出系统存在的漏洞及其他不安全因素呢?有。微软推出的MBSA(Microsoft Baseline Security Analyzer)就是这样一个强大的工具,该软件包含大部分的微软... 现在,大家对系统安全的关注提升到了一个新的高度,那么有没有一个工具能够快速检测出系统存在的漏洞及其他不安全因素呢?有。微软推出的MBSA(Microsoft Baseline Security Analyzer)就是这样一个强大的工具,该软件包含大部分的微软软件检测器,除了检测漏洞之外,还提供了详细的解决方案以及补丁下载地址,而且使用非常方便。 展开更多
关键词 系统安全检测 微软公司 MBSA 漏洞检测 系统修复 检测报告
原文传递
多维信息安全检测技术研究与应用
2
作者 桂超 胡滨 《信息与电脑》 2019年第1期215-216,共2页
在课程实训教学中,教师可以通过应用Web安全检测和系统安全等技术和工具,培养高职学生网络安全技术领域的基础知识能力、实践操作能力、分析解决问题能力和创新能力,全面提升高职学生的信息安全职业素质和技能。
关键词 Web安全检测 系统安全检测 高职实训教学
下载PDF
为你的系统做全面“体检”——Microsoft基准安全分析器
3
作者 淮河水手 《网上俱乐部(电脑安全专家)》 2004年第9期56-57,共2页
Windows是大家最常用的操作系统.如何让Windows更加安全可靠.是每个用户急待解决的问题。我们来用微软免费提供的系统安全检测工具——Microsoft Baseline Security Analyzer 1.2(简称MBSA).为系统做一次全面“体检”吧。
关键词 WINDOWS 操作系统 系统安全检测工具 基准安全分析器 MICROSOFT BASELINE SECURITY ANALYZER 1.2
下载PDF
Optimal configuration of firewall, IDS and vulnerability scan by game theory 被引量:7
4
作者 赵柳榕 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2011年第2期144-147,共4页
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash... The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail. 展开更多
关键词 economics of information systems FIREWALL intrusion detection system (IDS) vulnerability scan securityportfolio strategy
下载PDF
The Application of Weighted Association Rules in Host-Based Intrusion Detection System 被引量:1
5
作者 曹元大 薛静锋 《Journal of Beijing Institute of Technology》 EI CAS 2002年第4期418-421,共4页
Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weight... Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed. 展开更多
关键词 network security intrusion detection system association rules WEIGHT
下载PDF
“柳叶擦眼”找木马
6
作者 无风 《网迷》 2003年第7期75-75,共1页
“柳叶擦眼”——据说用柳树的叶子擦了眼睛后,可以看到本来看不到的东西,迷信的人用这种方法捉“鬼”。这里向大家介绍一下《WINDOWS优化大师》的“柳叶擦眼”方法,可以让我们看到系统中原本看不到的“鬼”——木马。
关键词 “柳叶擦眼”方法 木马程序 《WINDOWS优化大师》 系统安全检测概念工具
下载PDF
Design of motion control of dam safety inspection underwater vehicle 被引量:5
7
作者 孙玉山 万磊 +2 位作者 甘永 王建国 姜春萌 《Journal of Central South University》 SCIE EI CAS 2012年第6期1522-1529,共8页
Plenty of dams in China are in danger while there are few effective methods for underwater dam inspections of hidden problems such as conduits,cracks and inanitions.The dam safety inspection remotely operated vehicle(... Plenty of dams in China are in danger while there are few effective methods for underwater dam inspections of hidden problems such as conduits,cracks and inanitions.The dam safety inspection remotely operated vehicle(DSIROV) is designed to solve these problems which can be equipped with many advanced sensors such as acoustical,optical and electrical sensors for underwater dam inspection.A least-square parameter estimation method is utilized to estimate the hydrodynamic coefficients of DSIROV,and a four degree-of-freedom(DOF) simulation system is constructed.The architecture of DSIROV's motion control system is introduced,which includes hardware and software structures.The hardware based on PC104 BUS,uses AMD ELAN520 as the controller's embedded CPU and all control modules work in VxWorks real-time operating system.Information flow of the motion system of DSIROV,automatic control of dam scanning and dead-reckoning algorithm for navigation are also discussed.The reliability of DSIROV's control system can be verified and the control system can fulfill the motion control mission because embankment checking can be demonstrated by the lake trials. 展开更多
关键词 dam safety inspection remotely operated vehicle (DSIROV) control system architecture embedded system automaticcontrol of dam-scanning dead-reckoning
下载PDF
An immunity-based technique to detect network intrusions
8
作者 潘峰 丁云飞 汪为农 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第5期371-377,共7页
This paper briefly reviews other people’s works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune... This paper briefly reviews other people’s works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune algorithm, multi-level negative selection algorithm, is developed. In essence, compared with Forrest’s negative selection algorithm, it enhances detector generation efficiency. This algorithm integrates clonal selection process into negative selection process for the first time. After careful analyses, this algorithm was applied to network intrusion detection and achieved good results. 展开更多
关键词 Artificial immune system Network intrusion detection Negative selection Clonal selection
下载PDF
MULTI-AGENT SYSTEM FOR WORM DETECTION AND CONTAINMENT IN METROPOLITAN AREA NETWORKS
9
作者 Gou Xiantai Jin Weidong Zhao Duo 《Journal of Electronics(China)》 2006年第2期259-265,共7页
Active worms can cause widespread damages at so high a speed that effectively precludes human-directed reaction, and patches for the worms are always available after the damages have been caused, which has elevated th... Active worms can cause widespread damages at so high a speed that effectively precludes human-directed reaction, and patches for the worms are always available after the damages have been caused, which has elevated them self to a first-class security threat to Metropolitan Area Networks (MAN). Multi-agent system for Worm Detection and Containment in MAN (MWDCM) is presented to provide a first-class automatic reaction mechanism that automatically applies containment strategies to block the propagation of the worms and to protect MAN against worm scan that wastes a lot of network bandwidth and crashes the routers. Its user agent is used to detect the known worms. Worm detection agent and worm detection correlation agent use two-stage based decision method to detect unknown worms. They adaptively study the accessing in the whole network and dynamically change the working parameters to detect the unknown worms. MWDCM confines worm infection within a macro-cell or a micro-cell of the metropolitan area networks, the rest of the accesses and hosts continue functioning without disruption. MWDCM integrates Worm Detection System (WDS) and network management system. Reaction measures can be taken by using Simple Network Management Protocol (SNMP) interface to control broadband access server as soon as the WDS detect the active worm. MWDCM is very effective in blocking random scanning worms. Simulation results indicate that high worm infection rate of epidemics can be avoided to a degree by MWDCM blocking the propagation of the worms. 展开更多
关键词 Multi-agent system Worm detection Worm containment Metropolitan area networks
下载PDF
A virtual machine-based invasion detection system for the virtual computing environment
10
作者 曾宇 Wang Jie +2 位作者 Sun Ninghui Li Jun Nie Hua 《High Technology Letters》 EI CAS 2006年第4期379-384,共6页
Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in tra... Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain. 展开更多
关键词 virtual computing environment oriented virtual machine-based invasion detection system (VIDS) capacity services computing
下载PDF
Analysis of Oseltamivir Resistance Substitutions in Influenza Virus Glycoprotein Neuraminidase using a Lentivirus-Based Surrogate Assay System
11
作者 Jennifer Tisoncik-Go Katie S Cordero Lijun Rong 《Virologica Sinica》 SCIE CAS CSCD 2013年第2期81-91,共11页
Influenza A virus poses a great threat to global health, and oseltamivir (trade marked as Tamiflu), which targets influenza surface glycoprotein neuraminidase (NA), is used clinically as a major anti-influenza treatme... Influenza A virus poses a great threat to global health, and oseltamivir (trade marked as Tamiflu), which targets influenza surface glycoprotein neuraminidase (NA), is used clinically as a major anti-influenza treatment. However, certain substitutions in NA can render an influenza virus resistant to this drug. In this study, using a lentiviral pseudotyping system, which alleviates the safety concerns of studying highly pathogenic influenza viruses such as avian influenza H5N1, that utilizes influenza surface glycoproteins (hemagglutinin or HA, and NA) and an HIV-core combined with a luciferase reporter gene as a surrogate assay, we first assessed the functionality of NA by measuring pseudovirion release in the absence or presence of oseltamivir. We demonstrated that oseltamivir displays a dose-dependent inhibition on NA activity. In contrast, a mutant NA (H274Y) is more resistant to oseltamivir treatment. In addition, the effects of several previously reported substitution NA mutants were examined as well. Our results demonstrate that this lentivirus-based pseudotyping system provides a quick, safe, and effective way to assess resistance to neuraminidase inhibitors. And we believe that as new mutations appear in influenza isolates, their impact on the effectiveness of current and future anti-NA can be quickly and reliably evaluated by this assay. 展开更多
关键词 Influenza virus Neuraminidase (NA) OSELTAMIVIR Drug resistance
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部