期刊文献+

网络安全事件应急响应策略体系研究 被引量:7

ON THE ARCHITECTURE OF NETWORK SECURITY INCIDENT EMERGENCY RESPONSE STRATEGY
下载PDF
导出
摘要 随着计算机网络技术的发展,资源共享的程度进一步加强,随之而来的网络安全问题也日益突出。结合实际工作经验和研究成果,在研究计算机网络安全应急响应的基本理论、技术和应用情况的基础上,针对指导建立有效的计算机网络安全应急响应机制的相关策略进行重点研究,分析该体系框架的策略组成、策略作用对象、策略间关系及策略的作用过程,并设计了计算机网络安全应急响应策略体系框架。 Along with the development of network technology, the extent of resource share became further strengthened, which brings increasingly the problem of network security. In this paper, on the basis of practical experiences and research results, and the study of Computer Network Security Emergency Response basic theories, technologies and applications, the correlated policies of guiding and establishing effective computer network security emergency response mechanisms is researched, and the architecture framework of the Computer Network Security Emergency Response Strategy was designed. Finally, the composing, objects of action, internal relationships and action process of the strategies in the above-mentioned framework are also analyzed.
出处 《计算机应用与软件》 CSCD 2009年第7期274-277,共4页 Computer Applications and Software
关键词 应急响应 入侵检测 网络安全 计算机应急响应组 Emergency response Intrusion detection Network security CERT
  • 相关文献

参考文献5

二级参考文献24

  • 1黄澄清.发展中的我国网络安全应急响应体系[J].信息网络安全,2005(3):27-28. 被引量:2
  • 2王常吉,段海新,吴建平.计算机应急响应服务中安全事件分类方法研究[J].中山大学学报(自然科学版),2005,44(B06):115-118. 被引量:2
  • 3王文俊.突发公共事件应急信息系统及其技术体系[J].信息化建设,2005(9):18-20. 被引量:25
  • 4傅坚,张翎.骨干网安全与电信运营商应急体系建设[J].电信科学,2006,22(2):27-30. 被引量:3
  • 5Anup K Ghosh, Aaron Schwartzbard, Michael Schatz. Learning program behavior profiles for intrusion detection. In: Proceedings of the 1 st USE-NIX Workshop on Intrusion Detection and Network Monitoring. Santa Clara, California, 1999
  • 6Intrusion Detection Working Group. Intrusion detection message exchange format data model and extensible markup language (XML) document type definition. http : ∥ www . ietf . org/ internet-drafts/ draft-ietf-idwg-idmef- xml-10 . txt . 2003
  • 7Wenke Lee. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems: [PhD Dissertation]. Columbia University, 1999
  • 8S A Hofmeyr, S Forrest, A Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998,6:151-180
  • 9Me L. Genetic algorithms, a biologically inspired approach for security audit trails analysis, short paper, presented at the 1996 IEEE Symposium on Security and Privacy. Oakland, CA, 1996
  • 10Rebecca Gurley Bace. Intrusion Detection. U S A: Macmillan Technical Publishing, 1999

共引文献26

同被引文献29

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部