期刊文献+

用户环境切换的关键技术及实现

Key Technique and implement of User Environment Switch System
下载PDF
导出
摘要 本文首先介绍了入侵诱骗系统的概念,在此基础上给出一个结合环境切换技术的入侵诱骗系统原型,并以此原型为指导,设计出基于TCP层的环境切换子系统。论文提出了用户环境切换和用户连接切换中各种状态信息提取、迁移及恢复的方法、通过修改Linux内核,增加内核模块等方式实现环境切换子系统。 The article introduces the concept of Intrusion Deception System, gets the Intrusion Deception System prototype based on Environment Switch technology, and designs Environment Switch Subsystem based on the TCP. According to the features of Linux kernel, the article puts forward the methods of various state information's retrieving, migrating and recovering in user environment switch and user connection switch technologies. By means of modifying Linux kernel and adding kernel module, we implement the Environment Switch Subsystem based on the TCP laver.
作者 张亦辉
出处 《微计算机信息》 2009年第18期78-80,共3页 Control & Automation
关键词 动态防御 入侵诱骗 环境切换 用户环境 用户连接 dynamic defensive intrusion Deception environment switch user environment user connection
  • 相关文献

参考文献6

  • 1BAROUDI,S.;ZIADE,H .;MOUNLA, B .;Are we really protected against hackers? Information and Communication Technologies: From Theory to Applications, 2004.Proceedings. 2004 International Conference on 19-23 April 2004 Page(s):621-622 被引量:1
  • 2ENG ZHANG;SHI JIE ZHOU;ZHIGUANG QIN;JINDE LU;Honeypot:a Supplemented Active Defense System for Network Security. Parallel and Distributed Computing, Applications and Technologies,2003.PDCAT'2003 Proceedings of the Fourth International Conference on 27-29 Aug.2003 Page(s):231-235 被引量:1
  • 3TEO,L. ;SUN,Y .-A .;AHN, G Using Risk Awareness and Active -J.; Defeating Interet Attacks Honeypots.Information Assurance Workshop,2004.Proceedings.Second IEEE International Page (s):155-167 被引量:1
  • 4张国华,肖频.一种基于网络的入侵检测系统设计[J].微计算机信息,2009,25(6):70-72. 被引量:11
  • 5杨云.在Linux下配置防火墙的技术[J].铁路计算机应用,2004,13(3):37-39. 被引量:2
  • 6胡恒一.面向入侵诱骗的环境切换技术的研究与实现[D],北京航空航天大学硕士学位论文,2005 被引量:1

二级参考文献7

  • 1张海芹,须文波.基于移动Agent的新型分布式入侵检测系统[J].微计算机信息,2006,22(08X):76-77. 被引量:8
  • 2RichardPetersen 王建桥 杨涛 杨晓云 高文雅 等.Red Hat Linux技术大全[M].北京:机械工业出版社,2001.. 被引量:1
  • 3OLAF KIRCH TERRY DAWSON 唐钧 张涛 等.Linux网络管理员指南:(第2版)[M].北京:中国电力出版社,2001.. 被引量:1
  • 4Zhang Y, Lee W. Intrusion detection in wireless Ad-Hoc net- works. In Proceedings of the Sixth Annual International Conference on Mobile Communication and Networking, ACM Press New York, USA, 2001:275-283. 被引量:1
  • 5Perkins C.Addison-Wesley,DSDV:Routing over a muhihop wireless network of mobile computers,Reading, MA,2003:88-91. 被引量:1
  • 6孙军帅.网络入侵检测系统研究.http://219.246.131.5/kns50. 被引量:1
  • 7A.W. Krings, W.S. Harrison, N. Hanebutte, C. Taylor, and M. McQueen. A Two-Layer Approach to Strrvivability of Networked Computing Systems, http://www.cs.uidaho.edu/krings. 被引量:1

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部