浅谈影响计算机网络安全的内部因素
摘要
文章从计算机网络系统安全的完整性,计算机网络系统安全的安全性,计算机网络系统安全的保密性三方面概述了影响计算机网络安全的内部因素。
出处
《中国西部科技》
2010年第30期46-47,共2页
Science and Technology of West China
二级参考文献24
-
1[1]Jai Balasubramaniyan, Garcia-Fernandez Jose Omar, Isacoff David, et al. An ar chitecture for intrusion detection using autonomous agents[D]. Department of Computer Sciences, Purdue University, West Lafayette, Indiana: Coast TR 9805, 1998.
-
2[2]Staniford-Chen S, Cheung S, Crawford R, et al. GrIDS-a graph-b ased intrusion detection system for large networks[A]. In: The 19th National Information Systems Security Conference[C].1996.http://seclab.cs.ucdavis. edu/papers/nissc96.pdf.
-
3[3]Tung Brian. Common intrusion detection framework (CIDF)[EB/OL] . http://www.isi.edu/~brian/cidf/1999-09-10/2001-05-07.
-
4[4]Zamboni Diego, Spafford E H. A prototype for a distributed intrusio n detection system[D]. Department of Computer Sciences, Purdue University, West Lafayette, Indiana: Coast TR 98-06,1998.
-
5[5]Vigna G, Kemmerer R A. NetSTAT: a network-based intrusion detection system [J]. Journal of Computer Security,1999,7(1).http://ww w.cs.ucsb.edu/~rsg/pub/1999-vigna-kemmerer-jcs99.ps.gz.
-
6[6]Bishop Matt, Northcutt Stephen. Executive summary[EB/OL]. http ://seclab.cs .ucdavis.edu/projects/idrds/summary.html, 1998-08-04/2001-05-07.
-
7[7]Erlinger Michael, Staniford-Chen Stuart. Intrusion detection exchang e format (idwg)[EB/OL]. http://www.ietf.org/html.charters/idwg-chart er.html, 2001-04-30/2001-05-07.
-
8[8]Eckmann S T, Vigna G, Kemmerer R A. STATL: an attack language for sta te-based intrusion detection[A]. In: Proc of the ACM Workshop on Int rusion Detection[C]. Athens, Greece, 2000. http://www.cs.ucsb.edu/~rsg/ pub/2000-eckmann-vigna-kemmerer-wids00.ps.gz.
-
9[9]Vigna G, Eckmann S T, Kemmerer R A. Attack languages[A]. In: Proc of the IEEE Information Survivability Workshop[C]. Boston, MA, 2000. http://www.cs.ucsb.edu/~rsg/pub/2000-vigna-eckmann-kemmerer-attac klanguages.ps.gz.
-
10[10]Renesse Robbert van, Minsky Yaron, Hayden Mark. A gossip-base d failure detection service[A]. In: Proc of Middleware'98[C]. England,1 998. http://www.cs.cornell.edu/Info/Projects/Spinglass/public-pdfs/Goss ip%2520Style%2520Failure.pdf.
共引文献10
-
1周竞,黄河.网络入侵检测中的响应机制及应用[J].交通与计算机,2004,22(5):54-57.
-
2田伟,顾韵华,丁妮.网络行为监测与还原系统及关键技术研究[J].计算机工程与设计,2008,29(2):479-482. 被引量:2
-
3姜千,胡亮,赵阔,努尔布力,王程明.入侵检测系统评估技术研究[J].吉林大学学报(信息科学版),2009,27(4):383-388. 被引量:2
-
4李永志,刘峰,张永胜.基于ROR框架的军事信息系统安全管理技术[J].指挥控制与仿真,2012,34(2):123-127.
-
5隋新.主机特征信息被动识别的研究与实现[J].科学技术与工程,2013,21(3):652-658. 被引量:13
-
6陆立峥,陈金山.网络追踪模型的研究[J].廊坊师范学院学报(自然科学版),2013,13(1):25-27.
-
7刘淑芳.关于智能网业务嵌套解决方案的建议[J].数字技术与应用,2013,31(9):221-221.
-
8周丽娟,于雪晶,魏卓.基于萤火虫群算法的网络入侵优化检测算法[J].吉林大学学报(信息科学版),2015,33(3):338-343. 被引量:6
-
9袁梁.Web浏览器跨协议通信安全性研究[J].哈尔滨商业大学学报(自然科学版),2017,33(4):473-476.
-
10汪洋,龚俭.入侵检测系统评估方法综述[J].计算机工程与应用,2003,39(32):171-173. 被引量:10