期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Optimal configuration of firewall, IDS and vulnerability scan by game theory 被引量:7
1
作者 赵柳榕 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2011年第2期144-147,共4页
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash... The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail. 展开更多
关键词 economics of information systems FIREWALL intrusion detection system (IDS) vulnerability scan securityportfolio strategy
下载PDF
网虫的贴身法宝(十一)
2
作者 武金刚 《电脑校园》 2002年第11期46-47,共2页
时光荏苒,岁月如梭,伴着飒飒的秋风,伴着煦暖的秋阳,“小武游记”又和你见面了。俗话说:山不厌高,水不厌深。我们在知识的高山上攀登,在网络的海洋里畅游,我相信:只要我们在明媚的春天有一份耕耘,定会在硕果飘香的金秋有一份收获。下面... 时光荏苒,岁月如梭,伴着飒飒的秋风,伴着煦暖的秋阳,“小武游记”又和你见面了。俗话说:山不厌高,水不厌深。我们在知识的高山上攀登,在网络的海洋里畅游,我相信:只要我们在明媚的春天有一份耕耘,定会在硕果飘香的金秋有一份收获。下面就让我们进入“小武游记”的世界吧! 展开更多
关键词 动画文件制作 制作方法 AnimagicGIFAnimator 系统漏洞检测 《东方卫士》
下载PDF
Research on Key Technology of Web Vulnerability Detection System Based on Cloud Environment
3
作者 Zhang Zhen 《International Journal of Technology Management》 2013年第12期121-124,共4页
In the light of the defect of web vulnerability detection system, combined with the characteristics of high efficient and sharing in the cloud environment, a design proposal is presented based on cloud environment, wh... In the light of the defect of web vulnerability detection system, combined with the characteristics of high efficient and sharing in the cloud environment, a design proposal is presented based on cloud environment, which analyses the key technology of gaining the URL, task allocation and scheduling and the design of attack detection. Experiment shows its feasibility and effectiveness in this paper. 展开更多
关键词 cloud technology web crawler task allocation and scheduling detection of SQL injection XSS detection
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部