期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于漏洞属性矩阵的防火墙设计优化策略 被引量:1
1
作者 李国金 林柏钢 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2004年第A01期91-94,共4页
分析了20个常见的防火墙漏洞,构造出一套防火墙漏洞属性矩阵,从不同的视角来分析并帮助预测防火墙中的漏洞,并演示了如何根据这套矩阵来优化防火墙的设计.该方法对最大化减少防火墙中的漏洞,保证网络安全运行有着显著的作用.
关键词 防火墙漏洞 漏洞属性矩阵 流处理步骤模型
下载PDF
利用防火墙技术处理局域网安全漏洞 被引量:2
2
作者 魏利华 《计算机与数字工程》 2004年第3期66-69,共4页
因局域网越来越多地遭到黑客的攻击 ,其安全性成为一个至关重要的问题。本文基于网络体系结构、TCP/IP协议存在安全漏洞、防火墙技术的分析和探讨 。
关键词 网络体系结构 TCP/IP协议 防火墙技术安全漏洞
下载PDF
Optimal configuration of firewall, IDS and vulnerability scan by game theory 被引量:7
3
作者 赵柳榕 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2011年第2期144-147,共4页
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash... The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail. 展开更多
关键词 economics of information systems FIREWALL intrusion detection system (IDS) vulnerability scan securityportfolio strategy
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部