期刊文献+
共找到1,273篇文章
< 1 2 64 >
每页显示 20 50 100
Study on Network Security Architecture for Power Systems 被引量:2
1
作者 Chen Yan Li Zengzhi Liao Zhigang 《Electricity》 2005年第3期47-49,共3页
The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which ... The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which protected data and facilities from being attacked by outside users by means of firewall, security monitor and control system. Firewall was basically the first line of defense for the intranet; the security monitoring system was a kind of IDS (Intrusion Detection System), while security control system provided authentication, authorization,data-encrypted transmission and security management. This architecture provides various security services, such as identification, authentication, authorization, data integrity and confidentiality. 展开更多
关键词 network security power system IDS firewall
下载PDF
Proactive Security Mechanism and Design for Firewall
2
作者 Saleem-Ullah Lar Xiaofeng Liao +1 位作者 Aqeel ur Rehman MA Qinglu 《Journal of Information Security》 2011年第3期122-130,共9页
In this paper we have present the architecture and module for internet firewall. The central component is fuzzy controller while properties of packets are fuzzified as inputs. On the basis of proposed fuzzy security a... In this paper we have present the architecture and module for internet firewall. The central component is fuzzy controller while properties of packets are fuzzified as inputs. On the basis of proposed fuzzy security algorithm, we have figured out security level of each packet and adjust according to packets dynamic states. Internet firewall can respond to these dynamics and take respective actions accordingly. Therefore, proactive firewall solves the conflict between speed and security by providing high performance and high security. Simulation shows that if the response value is in between 0.7 and 1 it belongs to high security. 展开更多
关键词 firewall security security EVALUATION network security
下载PDF
Etrust Firewall在校园网络安全中的应用
3
作者 潘瑜 《常州工学院学报》 2003年第2期63-67,共5页
防火墙是一个或一组系统 ,它能够过滤进入和离开校园计算机网络的数据 ,EtrustFire wall能够根据各种给定的条件来保护网络 ,这些给定的条件既可以是指定的应用程序和指定的网络服务 ,也可以是指定的源地址和目标地址等。它通常以单个... 防火墙是一个或一组系统 ,它能够过滤进入和离开校园计算机网络的数据 ,EtrustFire wall能够根据各种给定的条件来保护网络 ,这些给定的条件既可以是指定的应用程序和指定的网络服务 ,也可以是指定的源地址和目标地址等。它通常以单个规则为基础 ,为校园计算机网络提供一致的安全保护。利用EtrustFirewall可以快速和容易地保护校园计算机网络 。 展开更多
关键词 Etrustfirewall 校园网 网络安全 防火墙 访问控制 数据包过滤 代理服务器 状态包过滤 停火区技术 JavaGUI 组件安装
下载PDF
<i>Inmap-t</i>: Leveraging TTCN-3 to Test the Security Impact of Intra Network Elements
4
作者 Antonino Vitale Marc Dacier 《Journal of Computer and Communications》 2021年第6期174-190,共17页
This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of <i... This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of <i>System under Test</i> (<i>SUT</i>). Instead of testing, as it is classically done, a software/firmware/ hardware element, an intangible object, namely the network, is tested in order to infer some of its security properties. After a brief introduction of TTCN-3 and Titan, its compilation and execution environment, a couple of use cases are provided to illustrate the feasibility of the approach. The pros and cons of using TTCN-3 to implement a scalable and flexible network testing environment are discussed. 展开更多
关键词 TTCN-3 network security Conformance Testing Deep Packet Inspection firewall
下载PDF
Design and Implementation of Security Solution for Computer Network
5
作者 Lihui SONG Haicun ZHAO 《International Journal of Technology Management》 2015年第5期75-78,共4页
This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, ... This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, desktop system security, virus protection, identity authentication, access control, information encryption, message integrity check, non-repudiation, security audit, intrusion detection, vulnerability scanning, electromagnetic leakage emission protection, security management and other security technology and management measures, the purpose is to establish a complete, multi-level three-dimensional, network security defense system. 展开更多
关键词 network security firewall Intrusion detection security audit
下载PDF
Security of Computer Network and Measures of Defense
6
作者 何德明 《电脑知识与技术(过刊)》 2011年第7X期4819-4824,4837,共7页
Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our... Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our life,its rapid development brings great convenience to us,and all of the computers will be connected by Internet in the 21 century,thus the meaning of information security has changed substantially.It not only changes from a general guarding to a common defence,but from a specific field to a public subject as well.However,the opening and sharing of the Internet resource,unefficient supervision as well as various virus make people's information and belongings being in an extremely dangerous environment.The fight between hackers and anti-hackers,destruction and anti-destruction has already affected the stable running of the network and users' legal right,caused great economy damages and it could also threat our country's security.So a right understanding and in-time measures should be paid special attention to.The thesis firstly expatiates the current state of the network security and its importance,and discusses some major factors and threats that affect the network security.And the thesis also introduce some catalogues of the security techniques,some relevant information and their major characters,besides that,I enumerate some popular and effective methods of protecting our network,including the widely used firewall,and the meticulous techniques such as security scan techniques and techniques of intrusion detection.Lastly,some protective measures are stated. 展开更多
关键词 network security firewall security scan techniques techniques of intrusion detection prevention Strategy
下载PDF
Study of An Integrated Security Solution for Network Information System
7
作者 Yangqing Zhu 《通讯和计算机(中英文版)》 2006年第3期35-39,56,共6页
下载PDF
基于校园网的FireWall的构架与实现 被引量:5
8
作者 张国祥 《湖北师范学院学报(自然科学版)》 2000年第3期20-24,共5页
论述了 Fire Wall的工作原理及在校园网中的架构 ,并利用共享软件 Linux实现了 Fire Wall在校园网中的架构 ;该 Fire Wall最大的优点是经济、实用、安全性高。
关键词 校园网 firewall LINUX 安全性
下载PDF
基于ACE和SSL的Firewall与IDS联动系统研究
9
作者 马占飞 尹传卓 《计算机工程与科学》 CSCD 北大核心 2014年第8期1486-1492,共7页
随着Internet的迅猛发展,网络攻击的方法和技术越来越智能化和多样化,网络安全需求与日俱增。传统的防火墙(Firewall)与入侵检测系统IDS已不能满足网络安全整体化需求。鉴于此,引入ACE网络通信中间件和SSL协议,采用开放接口方式,从网络... 随着Internet的迅猛发展,网络攻击的方法和技术越来越智能化和多样化,网络安全需求与日俱增。传统的防火墙(Firewall)与入侵检测系统IDS已不能满足网络安全整体化需求。鉴于此,引入ACE网络通信中间件和SSL协议,采用开放接口方式,从网络安全整体性与动态性的需求考虑,设计了一种新型的基于ACE和SSL通信平台的Firewall和IDS协同联动系统模型。该系统模型融合了Firewall和IDS的优点,采用加密信息传输机制、策略管理机制和联动分析算法,确保了传输信息的可靠性、完整性和机密性。实验结果表明,该联动系统不但能够有效地检测和防御攻击,而且具有良好的协作性、通用性和可扩展性。 展开更多
关键词 网络安全 入侵检测系统 防火墙 联动 中间件
下载PDF
计算机防火墙技术在网络发展中的研究与应用
10
作者 张全斌 周石玮 +1 位作者 刘偲 陈瑜 《计算机应用文摘》 2025年第3期141-143,146,共4页
随着互联网的快速发展,计算机网络已成为人们生活和工作中必不可少的一部分。然而,随着网络的不断扩张和网络犯罪的日益猖獗,网络安全问题引起了人们的广泛关注。在此背景下,作为计算机网络安全的重要组成部分,防火墙技术得到了越来越... 随着互联网的快速发展,计算机网络已成为人们生活和工作中必不可少的一部分。然而,随着网络的不断扩张和网络犯罪的日益猖獗,网络安全问题引起了人们的广泛关注。在此背景下,作为计算机网络安全的重要组成部分,防火墙技术得到了越来越广泛的研究和应用,它可保护计算机免受未经授权的访问或恶意攻击,是保护计算机网络安全的重要手段。随着网络攻击手段的不断升级和网络规模的不断扩大,对防火墙的研究和应用将更加广泛和深入,因此文章探讨了防火墙技术的研究与应用情况,旨在为行业发展提供借鉴经验。 展开更多
关键词 计算机防火墙 防火墙技术 应用 网络安全
下载PDF
浅谈Firewall技术
11
作者 雷超阳 刘军华 《长沙通信职业技术学院学报》 2002年第2期48-50,共3页
Firewall是一种非常有效的网络安全模型。系统分析了Firewall技术中的主要技术数据包过滤和代理服务技术,同时对Firewall的基本类型进行了比较,从而为企业选择一种访问控制策略提供一定的理论依据。
关键词 firewall技术 网络安全 防火墙 计算机网络
下载PDF
网络通信中数据安全技术应用研究
12
作者 卢斌 郑建虎 张庭玉 《通信电源技术》 2025年第1期147-149,共3页
随着信息技术和互联网的快速发展,网络通信已成为现代社会发展中不可或缺的一部分。然而,现阶段的网络通信存在数据泄露、身份伪造、非法访问等数据安全问题。在此背景下,数据安全技术成为保障网络通信安全的重点。文章基于网络通信要... 随着信息技术和互联网的快速发展,网络通信已成为现代社会发展中不可或缺的一部分。然而,现阶段的网络通信存在数据泄露、身份伪造、非法访问等数据安全问题。在此背景下,数据安全技术成为保障网络通信安全的重点。文章基于网络通信要求和数据安全技术,分析数据加密技术、身份认证技术、访问控制技术及防火墙技术等数据安全技术在网络通信中的具体应用。 展开更多
关键词 网络通信 数据安全技术 数据加密 身份认证 访问控制 防火墙
下载PDF
FPC: A New Approach to Firewall Policies Compression 被引量:2
13
作者 Yuzhu Cheng Weiping Wang +1 位作者 Jianxin Wang Haodong Wang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第1期65-76,共12页
Firewalls are crucial elements that enhance network security by examining the field values of every packet and deciding whether to accept or discard a packet according to the firewall policies. With the development of... Firewalls are crucial elements that enhance network security by examining the field values of every packet and deciding whether to accept or discard a packet according to the firewall policies. With the development of networks, the number of rules in firewalls has rapidly increased, consequently degrading network performance.In addition, because most real-life firewalls have been plagued with policy conflicts, malicious traffics can be allowed or legitimate traffics can be blocked. Moreover, because of the complexity of the firewall policies, it is very important to reduce the number of rules in a firewall while keeping the rule semantics unchanged and the target firewall rules conflict-free. In this study, we make three major contributions. First, we present a new approach in which a geometric model, multidimensional rectilinear polygon, is constructed for the firewall rules compression problem.Second, we propose a new scheme, Firewall Policies Compression(FPC), to compress the multidimensional firewall rules based on this geometric model. Third, we conducted extensive experiments to evaluate the performance of the proposed method. The experimental results demonstrate that the FPC method outperforms the existing approaches, in terms of compression ratio and efficiency while maintaining conflict-free firewall rules. 展开更多
关键词 firewall firewall POLICY network security firewall RULES compression
原文传递
A Case Study on Security Recommendations for a Global Organization
14
作者 Devashi Tandon Pratyush Parimal 《Journal of Computer and Communications》 2018年第3期128-153,共26页
In today’s world, computer networks form an essential part of any organization. They are used not only to communicate information amongst the various parties involved but also to process data and store critical infor... In today’s world, computer networks form an essential part of any organization. They are used not only to communicate information amongst the various parties involved but also to process data and store critical information which is accessible to approved subscribers. Protecting critical data, ensuring confidentiality, and thwarting illegal access are primary concerns for such organizations. This case study presents security recommendations for any such organization, to assist them in defining security policies at various levels of the network infrastructure. 展开更多
关键词 networking network Infrastructure security network security security Framework Access Policies THREAT Prevention INTRUSION Detection firewall VPN security network Attacks HACKING
下载PDF
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
15
作者 Andrew Blyth 《Journal of Information Security》 2014年第2期37-45,共9页
With the increasing use of novel exploitation techniques in modern malicious software it can be argued that current intrusion detection and intrusion prevention systems are failing to keep pace. While some intrusion p... With the increasing use of novel exploitation techniques in modern malicious software it can be argued that current intrusion detection and intrusion prevention systems are failing to keep pace. While some intrusion prevention systems have the capability to detect evasion techniques they all fail to detect novel unknown exploitation techniques. Traditional proxy approaches have failed to protect the universe of discourse that a network enabled service can be engaged in as they view all information flows of the same type in a uniform manner. In this paper we propose a micro-proxy architecture that utilizes reverse engineering techniques to identify a valid universe of discourse for a network service. This valid universe of discourse is then applied to validate legitimate transactions to a service. Thus in effect, the micro proxy implements a default deny policy via the analysis of the application level discourse. 展开更多
关键词 network security firewallS PROXIES and INTRUSION DETECTION
下载PDF
无线局域网应用多重USG防火墙的安全策略研究
16
作者 李清平 《现代计算机》 2024年第14期52-58,共7页
无线网络是一种方便灵活的网络接入方式,同时也存在一系列的安全威胁。通过对无线网络中可能产生的攻击和入侵方式进行详细的研究,确定基于华为USG5500防火墙的多重综合防御措施,包括身份验证、访问控制、数据加密、监测防御等多个方面... 无线网络是一种方便灵活的网络接入方式,同时也存在一系列的安全威胁。通过对无线网络中可能产生的攻击和入侵方式进行详细的研究,确定基于华为USG5500防火墙的多重综合防御措施,包括身份验证、访问控制、数据加密、监测防御等多个方面,重点放在无线网络的身份验证和访问控制上。基于eNSP平台部署仿真拓扑,规划IP地址和防火墙区域,在无线网络中采用WPA2-PSK加密技术和VLAN技术,在多重防火墙中设置访问控制策略和流量过滤规则。仿真结果表明,在正确设置策略规则的情况下,多重USG5500防火墙能够及时监控和识别网络中的异常行为,有效检测和阻止网络攻击,提升无线网络的安全性和可靠性。 展开更多
关键词 USG5500防火墙 无线网络 安全策略 访问控制策略 流量过滤规则 eNSP平台
下载PDF
计算机网络信息安全技术探讨 被引量:1
17
作者 谢德军 《科技资讯》 2024年第5期27-29,共3页
在网络信息时代,计算机网络信息安全技术得到广泛应用并持续更新。计算机网络信息安全具有保密性、完整性、可控性、可用性及不可否认性。计算机网络信息安全经常面临计算机病毒、黑客攻击、安全漏洞及硬件配置不到位等问题。为从技术... 在网络信息时代,计算机网络信息安全技术得到广泛应用并持续更新。计算机网络信息安全具有保密性、完整性、可控性、可用性及不可否认性。计算机网络信息安全经常面临计算机病毒、黑客攻击、安全漏洞及硬件配置不到位等问题。为从技术层面加强计算机网络信息安全,应掌握与应用好反病毒、身份确认、防火墙、入侵检测、数据加密等技术和数据安全协议。 展开更多
关键词 计算机网络 信息安全 反病毒 防火墙 数据加密
下载PDF
网络安全态势感知模型的研究进展 被引量:2
18
作者 方翔 《电子科技》 2024年第6期98-102,共5页
针对当前数量形式均不断增多的网络攻击,不同种类名称的网络安全态势感知模型受到学术界的广泛关注研究。在信息技术迅速普及的背景下,硬件系统、软件漏洞日常应用操作的安全漏洞,导致网络攻击的方式手段不断增多,而单一类型的网络安全... 针对当前数量形式均不断增多的网络攻击,不同种类名称的网络安全态势感知模型受到学术界的广泛关注研究。在信息技术迅速普及的背景下,硬件系统、软件漏洞日常应用操作的安全漏洞,导致网络攻击的方式手段不断增多,而单一类型的网络安全监控分析工具已难以适用于当前网络技术的发展。文中通过梳理网络安全态势感知技术的研究历史现状,总结分析了态势感知模型的技术理论发展及其工程应用,并且讨论了相关技术方案中存在的缺陷与不足,展望了网络安全态势感知模型未来的研究方向。 展开更多
关键词 网络安全 信息安全 态势感知 恶意软件 防火墙 入侵检测 流量分析 日志审计
下载PDF
计算机网络安全中防火墙技术的运用
19
作者 孙俊德 《科技资讯》 2024年第19期21-23,共3页
在软硬件处理能力不断提升的背景下,防火墙技术在计算机网络安全中发挥了更加出色的作用。首先,介绍了常见的几种防火墙,如包过滤防火墙、代理防火墙和下一代防火墙等。其次,从监控网络日志、加强安全配置、阻挡病毒入侵、设置访问规则... 在软硬件处理能力不断提升的背景下,防火墙技术在计算机网络安全中发挥了更加出色的作用。首先,介绍了常见的几种防火墙,如包过滤防火墙、代理防火墙和下一代防火墙等。其次,从监控网络日志、加强安全配置、阻挡病毒入侵、设置访问规则等方面,阐述了防火墙技术在计算机网络安全中的应用策略,以期在保障内部网络安全和维护用户数据隐私方面发挥作用。 展开更多
关键词 计算机网络安全 包过滤防火墙 代理防火墙 网络日志
下载PDF
计算机网络安全中虚拟网络技术的应用 被引量:1
20
作者 顾禹 《科技资讯》 2024年第7期12-14,共3页
计算机网络安全在现代社会得到广泛重视,这也对线上、线下各类防护技术提出了高要求。以计算机网络安全中常用虚拟网络技术为切入点,分析其常见应用形式、具体应用方法,包括应用需求分析、技术选择、提升安全防护的鲁棒性等,最后结合虚... 计算机网络安全在现代社会得到广泛重视,这也对线上、线下各类防护技术提出了高要求。以计算机网络安全中常用虚拟网络技术为切入点,分析其常见应用形式、具体应用方法,包括应用需求分析、技术选择、提升安全防护的鲁棒性等,最后结合虚拟实验,对计算机网络安全中虚拟网络技术的应用成效进行论证,服务未来工作。 展开更多
关键词 计算机网络安全 虚拟网络技术 防火墙 协议控制
下载PDF
上一页 1 2 64 下一页 到第
使用帮助 返回顶部