期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
网络安全检测系统的设计与实现 被引量:3
1
作者 张天明 《无线互联科技》 2018年第2期37-38,共2页
随着信息化时代的到来,网络覆盖人类生活的方方面面,对于各行各业的发展都具有较大的影响。文章针对网络安全检测系统的设计与实现进行研究,论述了网络安全检测系统的功能与分类。网络时代人类生活离不开网络,但是网络存在一定的风险性... 随着信息化时代的到来,网络覆盖人类生活的方方面面,对于各行各业的发展都具有较大的影响。文章针对网络安全检测系统的设计与实现进行研究,论述了网络安全检测系统的功能与分类。网络时代人类生活离不开网络,但是网络存在一定的风险性,为避免人类的隐私财产不受侵害,需要不断优化网络安全检测系统的设计,提高系统的使用性能。 展开更多
关键词 网络安全检测系统 设计 实现 监控
下载PDF
一种网络安全检测系统的设计与实现
2
作者 喻宏传 《铁路计算机应用》 2003年第z1期137-140,共4页
介绍了网络和系统中存在的安全漏洞,设计了一个网络安全检测系统(NSDS),并分析了每一个组成部分的功能,给出了设计思路,最后通过一个实例检验了整个系统的性能。
关键词 网络安全检测系统 设计 实现
下载PDF
在智能建筑施工中如何做好网络安全系统检测 被引量:2
3
作者 何世民 夏松林 +1 位作者 代宗玉 潘宇 《智能建筑与智慧城市》 2021年第8期79-80,共2页
文章针对智能建筑施工中的网络安全系统检测问题进行了分析总结。
关键词 智能建筑 施工 网络安全 网络安全系统检测
下载PDF
数字化校园网络安全体系的建构与实施 被引量:2
4
作者 熊婷 肖轮刚 梅毅 《科技风》 2012年第20期95-95,共1页
在分析高校校园网存在的主要安全问题的基础上,结合当前的网络安全技术和我院数字化校园网络的实际特点,提出构建一套功能完善的数字化校园网安全体系方案,阐述方案的关键技术,并提出了保障校园网安全的具体措施。
关键词 数字化校园网络安全病毒检测系统
下载PDF
网络入侵检测技术研究
5
作者 陈雪松 《软件导刊》 2007年第7期98-100,共3页
就信息网络安全内涵发生的根本变化,阐述了我国发展信息安全体系的重要性及建立有中国特色的网络安全体系的必要性。论述了入侵检测技术的分类及其主要技术特征。
关键词 网络安全入侵检测系统
下载PDF
网络安全防范新技术
6
作者 宫婧 顾强 孙知信 《江苏通信》 2004年第4期9-12,共4页
首先分析了当前网络安全的现状与威胁,接着介绍了防火墙技术、入侵检测技术等网络安全防范的几种关键技术,随后详细介绍了在网络安全防范的诱骗技术方面所做的研究。
关键词 网络安全:防火墙:入侵检测:诱骗系统
下载PDF
基于改进遗传算法的网络安全检测模型及系统构建 被引量:5
7
作者 曾兆敏 《自动化与仪器仪表》 2016年第10期204-205,207,共3页
网络检测系统根据收集、分析网络行为、安全日志、审计数据等获取信息,检测系统或网络是否存在违反安全策略的行为。文中简述遗传算法和网络安全检测系统后,提出基于粗粒度模型遗传算法网络检测系统,为满足系统要求设计适应度函数,确保... 网络检测系统根据收集、分析网络行为、安全日志、审计数据等获取信息,检测系统或网络是否存在违反安全策略的行为。文中简述遗传算法和网络安全检测系统后,提出基于粗粒度模型遗传算法网络检测系统,为满足系统要求设计适应度函数,确保遗传基因取舍和利用更为科学、合理。该系统主要由数据包采集模块、检测模块、响应模块等部分组成,充分发挥遗传算法在网络安全检测系统中的应用效果。 展开更多
关键词 改进遗传算法 网络安全检测系统 主要模块
原文传递
The Application of Weighted Association Rules in Host-Based Intrusion Detection System 被引量:1
8
作者 曹元大 薛静锋 《Journal of Beijing Institute of Technology》 EI CAS 2002年第4期418-421,共4页
Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weight... Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed. 展开更多
关键词 network security intrusion detection system association rules WEIGHT
下载PDF
Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI 被引量:1
9
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期564-570,共7页
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific... Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems. 展开更多
关键词 ubiquitous computing identity authentication mechanism D-S Evidence Theory SPKI/SDSI SECURITY
下载PDF
Personalized Trust Management for Open and Flat P2P Communities
10
作者 左敏 李建华 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期527-532,共6页
A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trus... A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trust from a subjective point of view and gives personalized decision support to each peer. Simulation experiments prove its three advantages: free of central control, stronger immunity to misleading recommendations, and limited traffic overload. 展开更多
关键词 P2P trust management DHT collaborative filtering
下载PDF
An immunity-based technique to detect network intrusions
11
作者 潘峰 丁云飞 汪为农 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第5期371-377,共7页
This paper briefly reviews other people’s works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune... This paper briefly reviews other people’s works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune algorithm, multi-level negative selection algorithm, is developed. In essence, compared with Forrest’s negative selection algorithm, it enhances detector generation efficiency. This algorithm integrates clonal selection process into negative selection process for the first time. After careful analyses, this algorithm was applied to network intrusion detection and achieved good results. 展开更多
关键词 Artificial immune system Network intrusion detection Negative selection Clonal selection
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部