[1]闻德军 张代远[].计算机网络安全与防护技术研究[J].计算机技术与发展,2012,(12):171-174.
 WEN De-jun,ZHANG Dai-yuan.Research of Computer Network Security and Defence Technology[J].,2012,(12):171-174.
点击复制

计算机网络安全与防护技术研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2012年12期
页码:
171-174
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Research of Computer Network Security and Defence Technology
文章编号:
1673-629X(2012)12-0171-04
作者:
闻德军12 张代远[123]
[1]南京邮电大学计算机学院[2]江苏省无线传感网高技术研究重点实验室[3]南京邮电大学计算机技术研究所
Author(s):
WEN De-jun ZHANG Dai-yuan
[1]College of Computer, Nanjing University of Posts and Telecommunications[2]Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks[3]Institute of Computer Technology, Nanjing University of Posts and Telecommunications
关键词:
网络安全防范技术SYN洪范攻击
Keywords:
network security defence technology SYN Flood
分类号:
TP309
文献标志码:
A
摘要:
计算机和网络安全是个至关重要的话题,但是仅仅靠防护系统来保存网民、企业和政府机构的数据是远远不够的。如路由器、DNS服务器和交换机等基础设施能够很好地将网络连接在一起,否则计算机不可能进行可靠的通信。鉴于网络安全的重要性,引出了几个问题:要用怎样的基础设施来应对怎样的网络安全威胁,当然首先要考虑的是成本。但是在所有这些问题之前要知道如何去定义一个安全的系统。什么是安全?每个人都能说出点什么,但很少有人能够对安全做出精确的定义。文中将以独特的视角来定义网络安全,因为这关系到一个国家、一个组织甚至是个人用户的现在和将来
Abstract:
Computer and network security are critical issues. But merely protecting the systems that hold data about citizens, corporations, and government agencies is not enough. The infrastructure of networks, routers, domain name servers and switches that glue these systems together must not fail, or computers will no longer be able to communicate accurately or reliably. Given the magnitude of secure cyberspace, a reflection on what are trying to do seems in order. Several questions arise, such as what exactly the infrastructure is, what threats it must be secured against, and how protection can be provided on a cost-effective basis. But underlying all these questions is how to de fine a secure system. What is security? Having it is obviously good;everyone says so. But few people defines it exactly, or even nebu lously. This column tries to place cybersecurity in perspective, because it is, of course, central to countries, organizations, and even home users now and in the future

相似文献/References:

[1]严华 蔡瑞英.即时通信监控系统的设计与实现[J].计算机技术与发展,2009,(07):242.
 YAN Hua,CAI Rui-ying.Design and Implementation of Monitoring System of Instant Messaging[J].,2009,(12):242.
[2]李生 邓一贵 唐学文 潘磊 林玉香.基于移动代理的分布式入侵检测系统的研究[J].计算机技术与发展,2009,(09):132.
 LI Sheng,DENG Yi-gui,TANG Xue-wen,et al.Research of Mobile Agent - Based Distributed Intrusion Detection System[J].,2009,(12):132.
[3]潘晓君.基于缓存超时的ARP欺骗攻击协议的研究[J].计算机技术与发展,2009,(10):167.
 PAN Xiao-jun.Research of ARP Spoofing Attack Protocol Based on Cache Overtime[J].,2009,(12):167.
[4]彭云峰 沈明玉.入侵防御系统在应急平台网络中的应用研究[J].计算机技术与发展,2009,(02):162.
 PENG Yun-feng,SHEN Ming-yu.Research on Intrusion Prevention System for Emergency Response Network[J].,2009,(12):162.
[5]尚占锋 章登义.DDoS防御机制研究[J].计算机技术与发展,2008,(01):7.
 SHANG Zhan-feng,ZHANG Deng-yi.Research of DDoS Defense Mechanism[J].,2008,(12):7.
[6]涂溢彬 饶云波[] 廖云 周明天.蜜网系统在检测新型Rootkit中的应用[J].计算机技术与发展,2008,(01):181.
 TU Yi-bin,RAO Yun-bo,LIAO Yun,et al.Honeynet System Applied in New Pattern Rootkit[J].,2008,(12):181.
[7]邵晓宇 杨善林 褚伟.基于Linux入侵检测动态防火墙的设计与实现[J].计算机技术与发展,2008,(05):156.
 SHAO Xiao-yu,YANG Shan-lin,CHU Wei.Design and Implementation of Dynamic Intrusion Detection Firewall Based on Linux[J].,2008,(12):156.
[8]孙印杰 王敏 陈智芳.解析蜜罐技术在网络安全中的应用[J].计算机技术与发展,2008,(07):129.
 SUN Yin-jie,WANG Min,CHEN Zhi-fang.Analysis Honeypot Technology Application in Network Security[J].,2008,(12):129.
[9]曹莹莹 王绍棣 王汝传 张伟.恶意代码传播效果的控制技术研究[J].计算机技术与发展,2010,(08):128.
 CAO Ying-ying,WANG Shao-di,WANG Ru-chuan,et al.Research on Malware Code Propagation Effect Control Technology[J].,2010,(12):128.
[10]潘文婵 章韵.路由器访问控制列表在网络安全中的应用[J].计算机技术与发展,2010,(08):159.
 PAN Wen-chan,ZHANG Yun.Application of Access Control List on Router in Network Security[J].,2010,(12):159.

备注/Memo

备注/Memo:
江苏高校优势学科建设工程资助项目(yx002001)闻德军(1989-),男,硕士研究生,研究方向为智能计算技术与应用;张代远,教授,硕士生导师,研究方向为智能计算理论、方浊与应用,计算机体系结构,计算机在通信中的应用
更新日期/Last Update: 1900-01-01