期刊文献+

网络入侵检测技术在图书馆网络系统中的应用

Application of Network Intrusion Detection Technique in the Library Network System
在线阅读 下载PDF
导出
摘要 随着互联网的迅速发展,许多新的技术被引入信息安全领域。本文针对图书馆网络的特点及保护信息的实际需要,设计了应用于高校图书馆网络入侵检测系统的结构,并对涉及的关键技术进行了实验分析。 With the high speed development of Internet,a lot of new technology is introduced into information security field.According to the characteristics of library network information and the need to protect the actual needs,the paper designs detection system structure which is applied to the universities' library network intrusion,and the related key technologies are analyzed.
作者 宋继军
出处 《科技广场》 2012年第7期48-50,共3页 Science Mosaic
关键词 入侵检测 网络安全 拒绝服务攻击 Intrusion Detection Network Security Denial of Service Attack
作者简介 宋继军(1966-),男,汉族,湖南醴陵人,副教授,本科,主要研究方向:计算机网络安全。
  • 相关文献

参考文献5

二级参考文献21

  • 1杨志文.深入LINUX建构与管理[M].中国青年出版社,2001.4.
  • 2[1]Comer D E.Intemetworking with TCP/IP:Vol.1--Principles,Protocols,and Architecture.3rd Edition,Upper Saddle River,NJ:Prentice Hall,Inc.,1995.
  • 3[2]W.R.Stevens.TCP/IP Illustrated,volume 1.Addison-Wesley Publishing Company,1984.
  • 4[3]S.M.Bellovin.Security Problems in the TCP/IP Protocol Suite.Computer Communication Review.Apr.1989.
  • 5[4]J.Postel,Echo Protocol.IETF RFC0862.1983.
  • 6[5]A.Dowling,J.G.Keating.A proxy-based security architecture for Intemet applications in an extranet environment.Journal of Systems and Software.Sep.2001.
  • 7[6]CERT ADVISORY.TCP SYN Flooding and IP Spoofing Attacks.CA-96-21,Sept.1996.
  • 8[7]CERT ADVISORY.IP Spoofing Attacks and Hijacked Terminal connections.CA-95-01,1995.
  • 9[8]S.Bellovin.Defending Against Sequence Number Atacks.IETF RFC1948.May 1996.
  • 10Agarwal, Joshi. PNrule:.A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection)A]. In Proceedings of the 1th SIAM International Conference on Data Mining[C], 2001

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部