期刊文献+

基于校园网安全的主动防御系统部署 被引量:1

The Deployment of the Active Defense System Based on Campus Network
在线阅读 下载PDF
导出
摘要 随着校园网办公自动化的不断普及,校园网络的安全问题也越来越受到更多地重视,它关系到学校的教学、科研和管理地工作是否能够正常进行。而传统的校园网安全防御体系已经很难适应当前复杂、大规模的攻击行为。虽然主动防御系统还存在着一些技术上的不足,但是它能够主动地检测、分析这些攻击行为,并对其及时阻断并提高系统的免疫力。该文以P2DR为实施模型,并结合现有的安全防御技术,构建了针对校园网存在的安全问题的主动防御系统及其相关的实施策略。 With the popularity of OA in the campus, the safety problem of the campus network is more to be taken into account, It relates to the normal work of teaching researching and management in the school.But traditional campus network security defense system has been difficult to adapt to the current attacks, which are complex and large-scale.Although there are still technical deficiencies in the Active Defense System, but it will take the initiative to detect and analyze these attacks, block them in time, and enhance its immunity.This paper designed an active defense system and its related implementation strategy for the security of campus network, which was based on P2DR, and integrated the current technology of security defense.
作者 谭方勇 于复生 TAN Fang-yong, YU Fu-sheng(Dept.of Computer Engineering, Suzhou Vocational University, Suzhou 215104, China)
出处 《电脑知识与技术》 2010年第1期52-53,66,共3页 Computer Knowledge and Technology
基金 苏州市职业大学科研基金项目(SZD08L25)
关键词 校园网 主动防御 P2DR IDS IPS campus network active defense P2DR IDS IPS
  • 相关文献

参考文献5

二级参考文献17

  • 1高光勇,迟乐军,王艳春.联动防火墙的主机入侵检测系统的研究[J].微计算机信息,2005,21(07X):66-68. 被引量:23
  • 2The honeynet project. http://projeet.honeynct.org.
  • 3Lance Spitzner. Definitions and value of honeypots. Http://www.tracking-hackers.com/papers/honeypots.html, 2003,5.
  • 4Deception Toolkit. 2001. http://www.all.net/dtk/index.html.
  • 5Intrusion battleground evolves. http://www. nwfusion. com/reviews/2001/1008bg.html.
  • 6Review: Intrusion-detection products grow up. http://www.nwfusion.com/reviews/2001 / 1008rev. html.
  • 7The honeynet project: Know your enemy. 2002,12, http://www.linuxsecurity.com/teature stories/honevnet-review-kye.html.
  • 8Klug D. Honeypots and intrusion detection. 2000.9.13,www. san.org/in fosecfaq/honeypots.
  • 9Levine J, LaBella R, Owen H, Contis D, Culver B. The use of honeynets to detect exploited systems across large enterprise networks. Proc. of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY,June 2003,www. tracking-hackers.com/papers/gatech-honeynet.pdf.
  • 10Nathalie Weiler. Honeypots for distribute denial of service attacks. 2002, 10, htp://www. tik.ee.cthz.ch/-weiler/papers/wetice02.pdf.

共引文献67

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部