期刊文献+
共找到44篇文章
< 1 2 3 >
每页显示 20 50 100
计算机网络安全与入侵检测技术浅谈
1
作者 张昆 李培强 《军民两用技术与产品》 2016年第2期21-33,共1页
计算机网络的安全已成为国家与国防安全的重要组成部分,而入侵检测技术是保证计算机网络安全的核心技术之一.本文在研究入侵检测概念的基础上,对入侵检测的过程进行了分析,并进行了分类,提出了入侵检测技术的发展趋势.
关键词 入侵检测 网络攻击:网络安全
下载PDF
《智慧城市轨道交通 信息技术架构及网络安全规范第3部分:网络安全》标准解读 被引量:5
2
《城市轨道交通》 2019年第7期19-22,共4页
编制背景面对复杂的网络攻击环境,为了保障国家网络空间的安全,国家高度重视网络安全,习近平主席提出了'没有网络安全就没有国家安全'的重要指示。《中华人民共和国网络安全法》于2017年6月1日正式实施,让网络安全建设有法可依... 编制背景面对复杂的网络攻击环境,为了保障国家网络空间的安全,国家高度重视网络安全,习近平主席提出了'没有网络安全就没有国家安全'的重要指示。《中华人民共和国网络安全法》于2017年6月1日正式实施,让网络安全建设有法可依。而在今年五月份发布的《网络安全等级保护》2.0的相关要求,则是进一步将相关要求具体到技术层面。 展开更多
关键词 城市轨道交通 网络安全 《智慧城市轨道交通 信息技术架构及网络安全规范第3部分:网络安全 应用系统安全 信息技术架构 云计算环境 网络 安全防护措施 标准解读
下载PDF
浅谈计算机网络安全防护 被引量:2
3
作者 史超 《科技信息》 2011年第1期I0078-I0078,共1页
随着计算机网络的飞速发展,应用需求的扩大,现代计算机系统功能日渐复杂,网络体系日渐强大,正在对社会产生巨大深远的影响,但同时由于计算机网络具有联结形式多样性、终端分布不均匀性和网络的开放性、互连性等特征,致使网络易受黑客、... 随着计算机网络的飞速发展,应用需求的扩大,现代计算机系统功能日渐复杂,网络体系日渐强大,正在对社会产生巨大深远的影响,但同时由于计算机网络具有联结形式多样性、终端分布不均匀性和网络的开放性、互连性等特征,致使网络易受黑客、恶意软件和其他攻击,所以使得安全问题越来越突出。本文针对网络安全的主要威胁因素,阐述了几种常用的网络信息安全防御策略,介绍了几种常见的安全技术。 展开更多
关键词 计算机网络:网络安全防护
下载PDF
我国网络安全存在的问题与对策探讨
4
作者 孟刚 《黑龙江科学》 2014年第12期232-232,共1页
随着社会的不断进步和经济的不断发展,现代高科技产品也越来越多。基于这种情况,计算机网络技术的应用变得更加广泛,也融入人们的日常的生活中。但是,不得不注意的是网络的安全问题,现在我国的网络技术存在着诸多的问题,本文就我国网络... 随着社会的不断进步和经济的不断发展,现代高科技产品也越来越多。基于这种情况,计算机网络技术的应用变得更加广泛,也融入人们的日常的生活中。但是,不得不注意的是网络的安全问题,现在我国的网络技术存在着诸多的问题,本文就我国网络安全存在的问题进行了简单的介绍,并就如何解决这些问题该采取的措施给予了分析。 展开更多
关键词 信息技术 网络安全:网络技术
下载PDF
分布式网络实时取证系统研究与设计 被引量:5
5
作者 戴江山 肖军模 张增军 《电子科技大学学报》 EI CAS CSCD 北大核心 2005年第3期347-350,共4页
在分析目前网络体系中存在的不利于网络取证的问题的基础上,提出和设计了一种分布式网络实时取证系统。该系统通过不断监视和分析网络内部的运行情况,在保护网络安全的基础上,确定网络入侵者的行为是否已构成犯罪,然后提取和分析入侵者... 在分析目前网络体系中存在的不利于网络取证的问题的基础上,提出和设计了一种分布式网络实时取证系统。该系统通过不断监视和分析网络内部的运行情况,在保护网络安全的基础上,确定网络入侵者的行为是否已构成犯罪,然后提取和分析入侵者犯罪证据信息,并实现证据信息的完整性保护和验证。最后,通过时间线性化实时融合,生成入侵者犯罪证据。 展开更多
关键词 网络安全:网络取证 分布式 数字证据
下载PDF
天津医院网络安全建设分析
6
作者 赵坤 《中国城乡企业卫生》 2012年第5期6-7,共2页
目的随着医院就诊人数的大量增加,对医院信息化的要求也就越来越高;信息化强度的增大,安全问题就成为了医院正常运转的首要问题。所以加强医院网络安全势在必行。方法针对天津医院的网络安全建设展开讨论,分析现在的安全措施,包括内网... 目的随着医院就诊人数的大量增加,对医院信息化的要求也就越来越高;信息化强度的增大,安全问题就成为了医院正常运转的首要问题。所以加强医院网络安全势在必行。方法针对天津医院的网络安全建设展开讨论,分析现在的安全措施,包括内网、外网的安全,软、硬件的安全防范方法等,并对当前的安全方案提出个人的建议。结果在现有的网络安全制度下,医院能够安全、高效、有序地运转,为医院提供了强大的信息安全保证。结论对于每一个信息化医院来说,稳定安全的网络信息平台,在很大程度上已经成为其业务成功的关键因素和可持续发展的重要环节,所以医院网络安全在医院信息化管理中已经占据很重要的地位。 展开更多
关键词 网络安全:网络管理
原文传递
A RISK ASSESSMENT METHOD OF THE WIRELESS NETWORK SECURITY 被引量:13
7
作者 Zhao Dongmei Wang Changguang Ma Jianfeng 《Journal of Electronics(China)》 2007年第3期428-432,共5页
The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method ... The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation. 展开更多
关键词 Wireless network Risk assessment Analytic Hierarchy Process (AHP) method Fuzzy logical method
下载PDF
NGN现状和发展趋势 被引量:2
8
作者 王宁 《价值工程》 2011年第7期165-166,共2页
中国电信行业经过多年的建设和发展,电信业固网市场的有效竞争格局已经形成,市场竞争局势日渐明朗,业务之间替代趋势明显、异质竞争也更为激烈,固网已经跨入了精细经营的时代。本文对电信行业的新技术NGN的发展做了详细的阐述,对NGN的... 中国电信行业经过多年的建设和发展,电信业固网市场的有效竞争格局已经形成,市场竞争局势日渐明朗,业务之间替代趋势明显、异质竞争也更为激烈,固网已经跨入了精细经营的时代。本文对电信行业的新技术NGN的发展做了详细的阐述,对NGN的关键技术做了详细的说明,希望能对读者有所帮助。 展开更多
关键词 NGN 网络:网络安全 信息
下载PDF
Security enhancement of WAPI access authentication protocol (WAI) 被引量:2
9
作者 刘永磊 金志刚 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第6期42-46,共5页
In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities o... In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities of WAI' were found out. The improvement of WAI' was made and a new protocol called WAI' - E was proposed. The WAI' -E was combined with the key exchange mechanism of Diffie-HeUman based on el- liptic curve cryptography. Moreover, by using CK mode, it is the fact that WAI'-E was SK-secure with PFS and was nrovided with inde^nendant sacuritv ,f cartifient~ mlthentientinn wn~ nravgd 展开更多
关键词 WLAN WLAN Authentication and Privacy Infrastructure Colored Petri Nets CK model
下载PDF
AN IMMUNITY-BASED SECURITY ARCHITECTURE FOR MOBILE AD HOC NETWORKS 被引量:2
10
作者 Yi Ping Zhong Yiping Zhang Shiyong 《Journal of Electronics(China)》 2006年第3期417-422,共6页
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents... This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents monitor the situation in the network. These agents can take appropriate actions according to the underlying security policies. Specifically, their activities are coordinated in a hierarchical fashion while sensing, communicating, decision and generating responses. Such an agent can learn and adapt to its environment dynamically and can detect both known and unknown intrusions. The proposed intrusion detection architecture is designed to be flexible, extendible, and adaptable that can perform real-time monitoring. This paper provides the conceptual view and a general framework of the proposed system. In the end, the architecture is illustrated by an example to show it can prevent the attack efficiently. 展开更多
关键词 Immune system Intrusion detection Mobile agent Mobile ad hoc network Network security
下载PDF
Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI 被引量:1
11
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期564-570,共7页
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific... Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems. 展开更多
关键词 ubiquitous computing identity authentication mechanism D-S Evidence Theory SPKI/SDSI SECURITY
下载PDF
Research and improvement on packet capture mechanism in linux for high-speed network 被引量:2
12
作者 杨武 方滨兴 +1 位作者 云晓春 张宏莉 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第5期494-498,共5页
With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic techniqu... With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic technique used in each field of the network applications. In a high-speed network, the heavy traffic of network transmission challenges the packet capture techniques. This paper does an in-depth analysis on the traditional packet capture mechanisms in Linux, and then measures the performance bottleneck in the process of packet capture. The methods for improving the packet capture performance are presented and an optimized packet capture scheme is also designed and implemented. The test demonstrates that the new packet capture mechanism (Libpacket) can greatly improve the packet capture performance of the network application systems in a high-speed network. 展开更多
关键词 high-speed network packet capture TCP/IP protocol stack performance bottleneck LKM
下载PDF
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
13
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
下载PDF
A novel secure multicast scheme in mobile Internet 被引量:1
14
作者 王国军 廖麟 +1 位作者 曹建农 CHAN Keith C.C. 《Journal of Central South University of Technology》 EI 2005年第6期720-725,共6页
A novel multicast communication model using a RingNet hierarchy is proposed. The RingNet hierarchy consists of 4 tiers: border router tier, access gateway tier, access proxy tier and mobile host tier. Within the hiera... A novel multicast communication model using a RingNet hierarchy is proposed. The RingNet hierarchy consists of 4 tiers: border router tier, access gateway tier, access proxy tier and mobile host tier. Within the hierarchy, the upper 2 tiers are dynamically organized into logical rings with network entities. A novel hierarchical secure access control scheme on key management is proposed based on the RingNet model. Network entities within the multicast hierarchy belong to different privileged local groups. Network entities of the higher-privileged local groups have the right to derive the keys held by network entities of the lower-privileged local groups, and the reverse operation is not allowed. With the key management approach, any insertion and changing of local group key will not affect other local groups. The analytical result shows that the scheme has higher security than Lin’s. 展开更多
关键词 key management access control related factor local group changing residue
下载PDF
Confidential Communication Through Chaos Encryption in Wireless Sensor Network 被引量:4
15
作者 CHEN Shuai ZHONG Xian-xin 《Journal of China University of Mining and Technology》 EI 2007年第2期258-261,共4页
A new byte block cipher algorithm with discrete chaos and Feistel structure has been studied for confidential communication in wireless sensor network to improve security. After permutation,the byte block was encrypte... A new byte block cipher algorithm with discrete chaos and Feistel structure has been studied for confidential communication in wireless sensor network to improve security. After permutation,the byte block was encrypted through a Feistel structure in multiple turns and afterwards replaced again. The child keys are the composite sequence of discrete chaos and linear congruence sequences. Both the plain text and cipher text are of 8 bits. The number of keys is alterable. A nonlinear encryption function in the Feistel structure with chaos was constructed. The cipher algorithm was realized in the Micaz node,and the confidential communication experiment in wireless sensor network was completed success-fully. Additional ROM memory required for the cipher algorithm is 4144 bytes and an additional RAM memory 61 bytes. The cipher algorithm is nonlinear chaos and the Feistel structure holds the best of the RC6,DES and SKIPJACK cipher algorithms.The result shows that the algorithm needs a little memory and is safe at a high level. 展开更多
关键词 ALGORITHM ENCRYPTION CHAOS wireless sensor network Feistel structure
下载PDF
AN INTELLIGENT METHOD FOR REAL-TIME DETECTION OF DDOS ATTACK BASED ON FUZZY LOGIC 被引量:2
16
作者 Wang Jiangtao Yang Geng 《Journal of Electronics(China)》 2008年第4期511-518,共8页
The paper puts forward a variance-time plots method based on slide-window mechanism tocalculate the Hurst parameter to detect Distribute Denial of Service(DDoS)attack in real time.Basedon fuzzy logic technology that c... The paper puts forward a variance-time plots method based on slide-window mechanism tocalculate the Hurst parameter to detect Distribute Denial of Service(DDoS)attack in real time.Basedon fuzzy logic technology that can adjust itself dynamically under the fuzzy rules,an intelligent DDoSjudgment mechanism is designed.This new method calculates the Hurst parameter quickly and detectsDDoS attack in real time.Through comparing the detecting technologies based on statistics andfeature-packet respectively under different experiments,it is found that the new method can identifythe change of the Hurst parameter resulting from DDoS attack traffic with different intensities,andintelligently judge DDoS attack self-adaptively in real time. 展开更多
关键词 Abnormal traffic Distribute Denial of Service (DDoS) Real-time detection Intelligent control Fuzzy logic
下载PDF
Secure Authentication of WLAN Based on Elliptic Curve Cryptosystem 被引量:1
17
作者 张龙军 韩玮 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期645-650,共6页
The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to t... The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEES02.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WI.AN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet. 展开更多
关键词 SECURITY wireless local area network (WLAN) elliptic curve cryptosystem
下载PDF
Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)
18
作者 季晓君 田畅 张毓森 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期188-191,196,共5页
Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and prio... Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET. 展开更多
关键词 mobile ad hoc network (MANET) SECURITY wormhole attack RECOVERY
下载PDF
Authorization Administration in a Distributed Multi-application Environment
19
作者 DUANSujuan HONGFan LIXinhua 《Geo-Spatial Information Science》 2004年第4期303-307,共5页
To meet the authorization administration requirements in a distributedcomputer network environment, this paper extends the role-based access control model with multipleapplication dimensions and establishes a new acce... To meet the authorization administration requirements in a distributedcomputer network environment, this paper extends the role-based access control model with multipleapplication dimensions and establishes a new access control model ED-RBAC(Extended Role Based AccessControl Model) for the distributed environment. We propose an extendable hierarchical authorizationassignment framework and design effective role-registeringi role-applying and role-assigningprotocol with symmetric and asymmetric cryptographic systems. The model can be used to simplifyauthorization administration in a distributed environment with multiple applications. 展开更多
关键词 authorization administration role-based control distributed environment
下载PDF
EKAES:AN EFFICIENT KEY AGREEMENT AND ENCRYPTION SCHEME FOR WIRELESS SENSOR NETWORKS
20
作者 Cheng Hongbing Yang Geng 《Journal of Electronics(China)》 2008年第4期495-502,共8页
Wireless sensor networks are being deployed for some practical applications and their se-curity has received considerable attention.It is an important challenge to find out suitable keyagreement and encryption scheme ... Wireless sensor networks are being deployed for some practical applications and their se-curity has received considerable attention.It is an important challenge to find out suitable keyagreement and encryption scheme for wireless sensor networks due to limitations of the power,com-putation capability and storage resources.In this paper,an efficient key agreement and encryptionscheme for wireless sensor networks is presented.Results of analysis and simulations among the pro-posed scheme and other schemes show that the proposed scheme has some advantages in terms ofenergy consumption,computation requirement,storage requirement and security. 展开更多
关键词 Wireless sensor networks Network security Key agreement ENCRYPTION
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部