期刊文献+

广西电大校园网安全的实施策略

The Implementation Strategy of Maintaining Guangxi TV University Campus Network Security
下载PDF
导出
摘要 本文先对网络安全的目标、网络安全问题的来源和应对策略进行了介绍,指出校园网不同于一般网络的特点和问题,针对校园网这一小型网络的需求,分析其方案设计及安全隐患,并介绍了校园网网络安全实施的具体方法和网络安全紧急响应体系等。 This paper gives an introduction to the aim of maintaining the network security,the cause of the network security problems and the countermeasures to them.It also points out the features and the problems of campus network which are different from those of the general network.According to the demand of campus network as a kind of small network,this paper analyzes its plan making and hidden security risks,and then introduces the methods of maintaining campus network security,such as the application of anti-virus technology,the access control of firework technology,the application of intrusion detection technology,the application of security scan technology,and the website real-time monitoring and restoring system as well as the network security emergency response system,etc.In addition,some practical campus network security technologies are introduced.
作者 王国榜
出处 《广西广播电视大学学报》 2009年第1期23-27,共5页 Journal of Guangxi Open University
关键词 网络安全 防火墙 安全设置 network security firework security settings.
  • 相关文献

参考文献5

二级参考文献16

  • 1周华,赵海燕,袁小刚.运用ARP欺骗进行网络安全管理[J].网络安全技术与应用,2005(3):44-45. 被引量:7
  • 2李海鹰,程灏,吕志强,庄镇泉.针对ARP攻击的网络防御模式设计与实现[J].计算机工程,2005,31(5):170-171. 被引量:47
  • 3郭浩,郭涛.一种基于ARP欺骗的中间人攻击方法及防范[J].信息安全与通信保密,2005,27(10):66-68. 被引量:17
  • 4马军,王岩.ARP协议攻击及其解决方案[J].微计算机信息,2006,22(05X):70-71. 被引量:54
  • 5NelloC JohnsT 李国正.支持向量机导论[M].北京:电子工业出版社,2004..
  • 6Biswanath M, Todd L, Karl N. Network Intrusion Detection [J].IEEE Network, 1994, 8(3) :26-41.
  • 7Bures J C. A Tutorial on Support Vector Machines for Pattern Recognition[J]. Data Mining and Knowledge Discovery, 1998, 2(2):121-167.
  • 8Vapnik V N. An Overview of Statistical Learning Theory [ J ]. IEEE Transactions on Neural Networks, 1999, 10(5) :988-999.
  • 9Kahn C, Porras P, Staniford-Chen S, et al. A Common Intrusion Detection Framework[ EB/OL]. Submitted to the Journal of ComputerSecurity. http ://www. isi. edu/gost/cidf/papers/cidf-jcs. ps, 1999-09.
  • 10Open Source Software Tcpdump Documents[ EB/OL]. http://www.tcpdump.org, 2005- 04.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部