期刊文献+

Novell环境下的入侵检测系统的实现 被引量:1

Implementing IDS in Novell
在线阅读 下载PDF
导出
摘要 基于对入侵检测技术的学习和研究,以亚洲证券南昌井冈山大道营业部的交易网络安全需求为背景,提出一种Novell环境下的入侵检测系统的实现方案。 Based on the study of intrusion detection technique,a general design scenario of IDS system in Novell environment is presented,which is designed for the network dealing security of Nanchang Branch,Asia Stock Jobber.
作者 汪星
出处 《计算机与现代化》 2003年第11期71-73,76,共4页 Computer and Modernization
  • 相关文献

参考文献4

二级参考文献22

  • 1Debar, Hervé and Dacier et al. Towards a Taxonomy of Intrusion Detection Systems. Zurich, Switzerland, IBM Research, 1998(http: ∥www. zurich. ibm. com/).
  • 2T H Ptacek and T N Newsham. Insertion, evasion, and denial of service: Eluding Network Intrusion Detection.Technical report, Secure Networks Inc., January 1998.
  • 3http:∥www. phrack. org.
  • 4D Malkhi and M Reiter. Unreliable Intrusion Detection in Distributed Computations, Proc. of the 10th Computer Security Foundations Workshop, Rockport, MA, June 1997:116 ~ 124.
  • 5Paxson V . Bro: A System for Detecting Network Intruders in Real- Time. In Proc. of the 7th USENIX Security Symposium, San Antonio, TX, January 1998.
  • 6The LIDS Project. http: ∥www. lids. org.
  • 7Snapp S R, Brentano J, Dias G V, et al. DIDS - Motivation,Architecture and an Early Prototype, Proc. of the 14th National Computer Security Conference, Washington, D C.,Oct. 1991:167 ~ 176.
  • 8Eugene H Spafford and Diego Zamboni. Intrusion detection using autonomous agents. Computer Networks, October2000, 34(4): 547 ~ 570.
  • 9James P Anderson. Computer Security Threat Monitoring and Surveillance. Technical Report, James P Anderson Co.,Fort Washington, PA., 1980.
  • 10Dorothy Denning. An Intrusion Detection Model. IEEE Transactions on Software Engineering, 1987, 13 (2): 222 ~232.

共引文献65

同被引文献13

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部