期刊文献+

一种资源协同的分布式网络安全审计体系 被引量:2

Network Security Audit System Using Resource Coordination
下载PDF
导出
摘要 网络安全审计技术是下一代互联网安全体系的关键技术,协同是目标追踪、网络防御方面讨论的热点.作者在综合研究分布式网络安全审计系统的基础上,设计了资源协同审计模型,提出了一种新型的支持IPv6的分布式网络安全审计体系,旨在最大化的利用网络审计资源,提高网络监控实效.通过实验证明,这种体系可以有效的提高安全审计效率、优化网络审计资源的利用. Network security audit is a key technology to the next generation of internet security system, coordination is a hot topic in target tracking, network security defense. Based on a comprehensive study of distributed network security audit system, this paper designs a resource collaboration work model, proposes a novel network security audit system with IPv6 support, seeking to maximize the utilization of resources and effectiveness of network monitor. Proved by experiment comparison, it can increase audit efficiency and optimize the utility of network audit resource.
出处 《北京交通大学学报》 EI CAS CSCD 北大核心 2007年第5期39-43,共5页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 北京市自然科学基金资助项目(4062026)
关键词 信息安全 网络安全审计 资源协同 分布式 information security network security audit resource coordination distributed type
  • 相关文献

参考文献9

  • 1Justin Kapp.How to Conduct A Security Audit[EB/OL](2001)[2007-2].http:∥www.techsupportalert.com/search/t 04123.pdf.
  • 2朱烨行,戴冠中,慕德俊,李艳玲.基于内容审查过滤的网络安全研究[J].计算机应用研究,2006,23(10):130-132. 被引量:6
  • 3廖志芳,樊晓平,谢岳山,杨玺,张恒.计算机联网审计组网模式的建立[J].计算机应用,2006,26(4):977-979. 被引量:8
  • 4Hock Beng Lim,Vinh The LAM,Mao Ching FOO,et al.Adaptive Distributed Resource Allocation in Wireless Sensor Networks[EB/OL].(2005)[2007]https:∥dspace.mit.edu/bitstream/1721.1/30203/1/CS002.pdf.
  • 5Mao Ching Foo,Hock Beng Lim,Yulian Zeng.Impact of Distributed Resource Allocation in Sensor Networks[C]∥Intelligent Sensors,Sensor Networks and Information Processing Conference,Singapore:IEEE,2005:69-74.
  • 6Ran Zhang,Depei Qian,Heng Chert,et al.Collaboration Intrusion Detection Based on Coordination Agent[C]∥Parallel and Distributed Computing,Applications and Technologies.Xi'an:IEEE,2003:175-179.
  • 7Torrellas G A S.Modelling A Network Security Systems Using Multi-Agents Systems Engineering Systems[C]∥Man and Cybemetics.IEEE,2003:4268-4273.
  • 8Merike Kaeo CCIE.网络安全性设计[M].2版.吴中福等译.北京:人民邮电出版社,2005.
  • 9Joseph S Valacich,Joey F George,Jefferey A Hoffer.Essentials of Systems Analysis Design[M].2ed.Beijing:Tsinghua University Press,2005.

二级参考文献18

  • 1CANCELA H,ROBLEDO F.Gerardo Rubino Network design with node connectivity constraints[A].Proceedings of the 2003 IFIP/ACM Latin America conference on Towards a Latin American agenda for network research[C].2003.
  • 2Neil Desail.Increasing Performance in High Speed NIDS[EB/OL].http://www.linuxsecurity.com/resource.files/instrusion-detecttion/increasing-performance-in-high-speed-NIDS.pdf,2003-01.
  • 3Boyer RS,Moore JS.A Fast String Searching Algorithm[J].Communications of the ACM,1977,20:762-772.
  • 4Aho AV,Corasick MJ.Efficient String Matching:An Aid to Bibliographic Search[J].Communications of the ACM,1975,18:333-340.
  • 5Commentz-Walter B.A String Matching Algorithm Fast on the Ave-rage[C].Proc.of the 6th International Colloquium on Automata Languages,and Programming,1979.118-132.
  • 6Wu S,Manber U.A Fast Algorithm for Multi-pattern Searching[R].Technical Report TR 94-17,University of Arizona,1994.
  • 7Ranum MJ.Thinking about Firewalls v2.0 Veyond Perimeter Security[R].Information Security Technical Report,1997.33-45.
  • 8费宗莲.内容过滤新概念[N].计算机世界报,39(D23).http://ww2.ccw.com.cn/02/0239/d/0239d08_2.asp.
  • 9张兵.利用WinSock2 SPI进行网络内容访问控制[J].网络世界,2002,(7).
  • 10林阳,祝智庭.国外因特网内容标记与过滤研究概况[EB/OL].http://202.120.94.248,www.celtsc.edu.cn/download,linzhu202.pdf,2004-06-02.

共引文献12

同被引文献29

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部