期刊文献+

网络攻击活动隐藏技术的分析与实现 被引量:1

Analysis and Implementation of the Hideaway Technology in Network Attacks
在线阅读 下载PDF
导出
摘要 深入分析了网络攻击活动中文件、进程、网络连接及通道的高级隐藏技术,其中包括:进程活动隐藏技术、文件隐藏技术、网络连接隐藏技术、网络隐蔽通道技术。这些技术有的已经被广泛应用到各种后门或安全检测程序之中。 The high-level hideaway technology of the document,the process,the network connection and the network channel in thoroughly network attacks has been analyzed,including: the process movement hideaway technology,the document hideaway technology,the network connection hideaway technology,the network covert channel technology,some of these technologies are already applied widely each kind of back door or in the safe examination procedure.
作者 李岚 吴玉 LI Lan,WU Yu (Anhui Commumcations Technology Institute,Hefei 230051,China)
出处 《电脑知识与技术》 2007年第2期961-963,共3页 Computer Knowledge and Technology
关键词 网络攻击 进程活动 隐藏 通道 Network Attack Process Movement Hideaway Channel
  • 相关文献

参考文献4

二级参考文献16

  • 1胡振昌.面向21世纪网络安全与防护[M].北京:希望电子出版社,1999..
  • 2Huang Y,Pullen J M.Countering Denial-of-service Attacks Using Congestion Triggered Packet Sampling and Filtering.10th International Conference on Computer Communications and Networks,2001.
  • 3Richard S W.TCP/IP Illustrated Volume 1:The Protocols.Addisonwesley,1994.
  • 4Agrawal R,Srikant R.Fast algorithms for mining association rules in large database[R].In Research Report RJ 9839,San Jose,CA:IBM Almaden Research Center,1994.
  • 5Agrawal R,Imielinski T,Swami A.Mining association rules between sets of items in large databases[A].Proceedings of the ACM SIGMOD Conference on Management of data[C].[s.l.]:[s.n.],1993.207-216.
  • 6Cohem W W.Fast Effective Rule Induction[A].In Proceedings of the Twelfth International Conference on Machine Learning (ICML-95)[C].Lake Tahoe,CA:Morgan Kaufman,1995.115-123.
  • 7Lee W.A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems[D].New York:Columbia University,1999.
  • 8Lee W,Stolfo S J.A Framework for Constructing Features and Models for Intrusion Detection Systems[J].ACM Trans on Inform and System Security,2000,3(4):227 -261.
  • 9[美]Haisen Linux安全基础[M].北京:人民邮电出版社,2002.34~37.
  • 10曹元其 Linux安全综述[EB/OL].http://www.yesky.com 2002-03-01

共引文献53

同被引文献3

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部