期刊文献+

网络攻击及网络安全解决方案 被引量:3

The network attack and network safe solution
下载PDF
导出
摘要 通过对目前网络攻击的主要形式分析,提出一种网络安全整体解决方案,并对各方面进行了一一阐述。最后提出,只有提高安全意识,才能真正发挥信息安全技术的优势,确保通信安全。 Through the analysis of current network attack forms, this paper proposed a whole sdving scheme for network safety, and elaborated each aspect one by one. It concluded that only by raising safety consciousness, the advantoages of information safety technology could be really exerted, in order to guarantee communication safety,
作者 宁博
出处 《西安邮电学院学报》 2008年第3期103-105,共3页 Journal of Xi'an Institute of Posts and Telecommunications
关键词 网络安全 安全策略 风险评估 network safety safe strategy the risk evaluate
  • 相关文献

参考文献4

二级参考文献9

  • 1戚丽,蒋东兴,武海平,冯珂.校园数据中心建设与管理方法的探索[J].中国教育信息化(高教职教),2002,0(S1):54-55. 被引量:24
  • 2Trusted Computer System Evaluation Criteria (TCSEC), US DoD 5200. 28- STD, December 1985.
  • 3蒋东兴.清华大学数字校园建设发展与规划.实验技术与管理,2000,.
  • 4蒋建春 冯登国.网络入侵检测原理与技术[M].北京:国防工业出版社,2000..
  • 5High-Performance Communication Networks.Jean Walrand,Pravin Varaiya,2nd Edition,Morgan Kaufmann Publishers Inc.
  • 6Reference Model for Firewall Technology and its Implications for Connection Signaling.J.Bryan Lyles and Christoph L.Schuba.Proceedings Open Signaling Workshop,Columbia University,NY,October 1996.
  • 7Denning .D.An Inrusion Detection Model ,IEEE Transactions on Software Engineering,1987,13(2)222-232.
  • 8.[EB/OL].http:∥www.netstd.com/.,.
  • 9.[EB/OL].http:∥it.riging.com.cn/safety/zhuanti/IDS/more.htm.,.

共引文献58

同被引文献15

  • 1RAN Y. Considerations and suggestions on improve- ment of communication network disaster counter- measures after the wenchuan earthquake [J]. IEEE communication magazine, 2011,48 (49) : 44-47.
  • 2Pankaj K, Alon E,Shashidhara G. The resilience of WDM networks to probabilistic geographical failures [C]//IEEE conference on computer communications. Shanghai: IEEE press, 2011 : 1521-1529.
  • 3Neumayer S, Zussman G, R. Cohen, et al. Assess- ing the impact of geographically correlated network failures [C]//2008 IEEE military communications conference. Baltimore, MD: [s. n. ] ,2008 : 1-11.
  • 4STRAUSS D. A model for clustering[J]. Biometrika, 1975(62) :467-475.
  • 5Neumayer S, Modiano E. Network reliability with geographically correlated failures[C]//IEEE confer- ence on computer communications. San Diego, CA: IEEE press, 2010 : 42-53.
  • 6DALEY D,VERE D. An introduction to the theory of point processes[M]. New York: Springer, 2008.
  • 7RIPLEY B D. Algorithm as 137: simulating spatial patterns: dependent samples from a multivariate den- sity[J]. Journal of the royal statistical society, 1979 (28) :109-112.
  • 8Church R L, Scaparra M P,Middleton R S. Identif- ying critical infrastructure., the median and covering facility interdiction problems [J]. Annals of associa- tion of American geographers, 2004,94 (3) : 491-502.
  • 9刘竹涛.网络安全评估与攻击防范策略[J].计算机安全,2008(9):117-119. 被引量:2
  • 10李小庆.银行网络安全风险分析及防范途径[J].华南金融电脑,2009,17(4):25-27. 被引量:4

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部