期刊文献+

舰船电子信息系统安全防护体系研究 被引量:12

Study on the Security Protection for Warship Electronic Information Systems
在线阅读 下载PDF
导出
摘要 随着网络中心战的到来,信息网络安全的重要性日益凸显,因此不断地提高舰船电子信息系统的安全性能,成为海军在未来的信息化战争中取得制胜关键的必然选择。文章对舰船电子信息系统的总体结构进行研究,并对系统可能受到的威胁类型进行分析,在此基础上设计了融合防火墙、入侵检测和访问控制等技术的舰船电子信息系统多层安全防护体系,并对该体系的结构和功能组成,以及各项技术在体系中的功能作用进行研究分析。多层安全防护体系的建立可以有效地提高舰船电子信息系统的安全性能。 With the arrival of "network-centric warfare",the importance of information network security has become increasingly prominent.Thus,continuously improving the warship electronic information systems security has become the inevitable choice to obtain the key to the victory of the future Navy's information warfare.This paper discussed the overall structure of the warship electronic information systems,and threats that the system may be faced with are analyzed and studied.On this basis,a warship electronic information system multi-layer security protection system is designed,this system fusion multi-technology as: firewall,intrusion detection and access control.The structure and function composing of multi-layer security protection system is described in detail,and each technology's role and function in the new system are analyzed and studied too.
作者 石剑琛
机构地区 海军装备部
出处 《计算机与数字工程》 2012年第2期68-71,82,共5页 Computer & Digital Engineering
关键词 舰船电子信息系统 安全防护 防火墙 入侵检测 访问控制 warship electronic information systems security protection firewall intrusion detection access control
  • 相关文献

参考文献12

二级参考文献28

  • 1林海涛,何如龙,刘波.外军舰船综合通信系统技术分析[J].中国修船,2006,19(3):31-33. 被引量:15
  • 2[1]Simon Haykin.Neural Networks A Comprehensive Foundation(Second Edition)[M].北京:机械工业出版社,2004.1
  • 3周光炎.免疫学原理[M].上海;上海科学技术文献出版社,2002:201-230.
  • 4Hofneyr S A, Forrest S. Architecture for an artificial immune system [ J ]. Evolutionary Computation, 2000, 8 (4) : 443 - 473.
  • 5Levenshtein V I. Binary codes capable of correcting deletions, insertions, and reversals [ J ]. Soviet Physics Doklady, 1966,10:707 - 710.
  • 6Hunt J E, Cooke D E. Learning Using an Artificial Immune System [J]. Journal of network and computer applications, 1996,19:189 - 212.
  • 7Sultan Weatherspoon. Overview of IEEE 802. 11B Security[ J].Intel Technology, 2000, Journal Q2.
  • 8Andrew H,Andrew H,Eleazar E.Adaptive Model Generation:An Architecture for Deployment of Data Mining-based Intrusion Detection Systems[R].Department of Computer Science,Columbia University,New York,2002.
  • 9Han J,Kamber M.Data Mining:Concepts and Techniques[M].Beijing:High Education Press,2001.
  • 10Wilson R,Martinez T.Improved Heterogeneous Distance Functions[J].Journal of Artifcial Intelligence Reaearch,1997,6(1):1-34.

共引文献20

同被引文献71

引证文献12

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部