期刊文献+

基于VPN的安全审计系统的设计与实现 被引量:5

Design and Implementation of Security Audit System Based on VPN
在线阅读 下载PDF
导出
摘要 针对VPN日志信息的特点,提出了一种安全审计系统的设计。通过采集VPN的多种日志信息进行分析,监控VPN的运行状况,检测系统中存在的不安全因素。既提高了VPN的运行性能,又弥补了VPN在安全防范上存在的不足。 This paper puts forward a security audit system based on VPN log, It keeps watch on the running status of VPN and detects insecurity factors of system through log analysis, which improves running and defense capability of VPN.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第9期177-179,共3页 Computer Engineering
关键词 VPN 日志 安全审计 VPN Log Security audit
  • 相关文献

参考文献3

二级参考文献15

  • 1[1]Anderson J P. Computer Security Threat Monitoring and Surveillance.Technical Report Contract 79F26400
  • 2[2]Denning D.E.An Intrusion-detection Model.IEEE Transactions on Software Engineering, 1987,SE- 13(2)
  • 3[3]Sebring M M, Shellhouse E,Hanna M E,etc. Expert Systems in Intrusion Detection:A Case Study.Proceedings of the 1lth National Computer Security Conferece, 1988-10
  • 4[4]Halme L,Kahn B.Building a Security Monitor with Adaptive User Work Profiles.Proceedings of the 11th National Computer Security Conferece,1988-10
  • 5[5]Lunt T F,Automated Audit Trail Analysis and Intrusion Detoction: A Survey. Proceedings of the 1 lth National Computer Security Conferece,1988-10
  • 6[6]http:∥www. docshow.net
  • 7[7]Ranum M T,Landfield K,Stolarchuk M, etc. Implementing a Generalized Tool for Monitoring. Network Flight Recorder,Inc.,1988
  • 8[1]anderson J P.Computer Security Threat Monitoring and Surveillance Fort Washington,James P.Anderson Co.,1980
  • 9[2]Matt B,Christopher W,Jeremy F.Goal-oriented Auditing and Logging IEEE Transactions on Computing Systems,1996
  • 10[3]Price K E.Hostbased Misuse Detection and Conventional Operating Systems audit Data Collection[Masters Thesis].Purdue University 1997-12

共引文献49

同被引文献46

引证文献5

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部