期刊文献+

主动式安全防御系统的研究与设计 被引量:1

Research and Design on an Active Security Defense System
下载PDF
导出
摘要 随着网络技术和网络规模的不断发展,新的安全威胁不断出现。而当前的安全防御技术主要采用被动式防御,存在反映滞后问题,在分析现有安全防御技术的基础上,介绍一种基于进程指纹识别的主动式安全防御系统模型,采用进程指纹特征识别来决定进程的合法性,从而确定系统的安全性。能够有效实现对未知非法进程的主动防御,提高系统安全性。 Along with the development of network technology and network size, the new security threats appear unceasingly. The present security defense technology mainly uses the passive defense, having the problem of the reflect lag. On the basis of analyzing the existing security defense technology, this paper introduces an active security defense system model based on the process fingerprint recognition technology, it uses the process fingerprint recognition to decide the validity of process, thus to determine the system security. This model can effectively implement active defense for unknown illegal process, and enhance the system security.
出处 《计算机与网络》 2010年第18期57-59,共3页 Computer & Network
基金 河南省自然科学基金(0611054800) 郑州市科技攻关项目(074SCCG38111)郑州市科技攻关项目(064SGYG21128)
关键词 安全 进程指纹 主动式防御 进程截获 security process fingerprint active defense process interception
  • 相关文献

参考文献6

二级参考文献30

  • 1连洁,王杰.入侵检测系统在涉密计算机中的应用研究[J].微计算机信息,2005,21(10X):24-26. 被引量:8
  • 2Ortalo R., Deswarte Y., Kaaniche M.. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 1999, 25(5): 633~650 被引量:1
  • 3Thorhuus R.. Software fault injection testing[M.S. dissertation]. Ericsson Telecom, Stockholm Sweden, 2000 被引量:1
  • 4Parsons S.. Some qualitative approaches to applying the dempster-shafer theory. Information and Decision Technologies, 1994, 19: 321~337 被引量:1
  • 5Saaty T.L.. How to make a decision: The analytic hierarchy process. European Journal of Operational Research, 1990, 48: 9~26 被引量:1
  • 6Mukherjee B, heberlein L T, Levitt K N. Network intrusion detection[J]. IEEE Network, 1994, 13(2): 26-41. 被引量:1
  • 7Anderson J P. Computer security threat monitoring and surveillance[R]. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania, 1980. 4. 被引量:1
  • 8Cervesato I., Durgin N.A., Lincoln P.D., Mitchell J.C., Scedrov A.. Relating strands and multiset rewriting for security protocol analysis. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, Cambridge, England, 2000, 35~52 被引量:1
  • 9Schneier B.. Applied Cryptography(2nd Edition). New York: John Wileysons, 1996 被引量:1
  • 10Rubin A.D.. Nonmonotonic cryptographic protocols[Ph.D. dissertation]. University of Michigan, Ann Arbor, 1994 被引量:1

共引文献67

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部