期刊文献+

军内网络安全防护体系框架研究 被引量:3

Study on Framework of Network Security Protection System in PLA
在线阅读 下载PDF
导出
摘要 随着网络信息技术的快速发展,网络信息安全也越来越受到人们的重视。广为泛滥的病毒传播和越来越多的黑客入侵事件,使人们充分认识到网络信息安全防护体系建设的重要性和紧迫性。文章主要通过对网络安全防护体系的分析,提出适合军内网络安全防护体系框架,该防护体系不仅能有效抵御外部网络入侵,而且对内部网络攻击也起到重要的防护作用,为后续军内网络建设提供一定的借鉴作用。 With the rapid development of network information technology, network information security has been paid more attention. More and more virus spreading and hacking incidents make people fully aware of the importance and urgency of network security protection system. This paper puts forward the framework of the network security protection system suitable for military, through analysis of network security protection system. The protection system not only can effectively resist the external network intrusion, but also play an important protective effect on the internal network attacks. And it provides a reference function for follow-up network construction in military.
机构地区 解放军
出处 《计算机与网络》 2012年第13期45-47,共3页 Computer & Network
关键词 网络安全防护体系 安全服务 安全机制 OSI/RM TCP/IP network security protection system security service security mechanism OSI/RM TCP/IP
  • 相关文献

参考文献2

二级参考文献11

  • 1贾晓剑,余荣,梅顺良.一种基于网络处理器的入侵检测防御系统的设计与实现[J].电子技术应用,2006,32(9):39-41. 被引量:2
  • 2National Computer Network Emergency Response Technical Team/Coordination Center of China ( CNCERT/CC ). CNCERT/CC Annual Report 2007 [ EB/OL], (2008-04-29) [ 2009-5-12 ]. http://www, cert. org. cn/UserFiles/File/CNCERTCCAnnualReport2007.pdf.
  • 3CHESWICK W R, BELLOVIN S M, RUBIN A D. Firewalls and internet security: repelling the wily hacker. AddisonWesley[M]. Beijing: China Machine Press, 2003.
  • 4GANAME A K, BOURGEOIS J, BIDOU R, et al. A high performance system for intrusion detection and reaction management [ J ]. Journal of Information Assurance and Security, 2006, 9:81-94.
  • 5The Board of Trustees of the Leland Stanford Junior University. NetFPGA guide[EB/OL]. (2008-10-16) [2009-5-12]. http://neffpga, org/neffpgawiki/index, php/Guide.
  • 6KATZ R, YU F. Efficient multi-match packet classification and lookup with TCAM[ C ]//High Performance Interconnects. In 12th Annual Proceedings of IEEE Hot Interconnects, [ S. l]: [s.n. ], 2004: 28-34.
  • 7Lee D T,Shieh S P,Tygar J D.Computer Security in the 21st Century[M].USA:Springer,2005.
  • 8CERT.CERT/CC Advisories[Z].http://www.cert.org/advisories.
  • 9CNCERT/CC.2005年CNCERT/CC网络安全工作报告[R/OL].2006.http://www.cert.org.cn/upload/2005CNCERTCCAnnualReport_Chinese.pdf.
  • 10Schwartau W.Time Based Security,Practical and Provable Methods to Protect Enterprise and Infrastructure,Networks and Nation[M].USA:Interpact Press Springer,1999-2001.

共引文献14

同被引文献8

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部