[1]方世林 陈顺平 汤飞球[].主动防御技术在权限控制中的应用研究[J].计算机技术与发展,2010,(11):150-153.
 FANG Shi-lin,CHEN Shun-ping,TANG Fei-qiu.Applied Research of Active Defense Technology in Access Control[J].,2010,(11):150-153.
点击复制

主动防御技术在权限控制中的应用研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2010年11期
页码:
150-153
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Applied Research of Active Defense Technology in Access Control
文章编号:
1673-629X(2010)11-0150-04
作者:
方世林1 陈顺平2 汤飞球[3]
[1]湖南理工学院计算机学院[2]湖南长沙学院图书馆[3]湖南理工学院信息学院
Author(s):
FANG Shi-linCHEN Shun-pingTANG Fei-qiu
[1]Department of Computer,Hunan Institute of Science and Technology[2]Library of Changsha University[3]Department of Information,Hunan Institute of Science and Technology
关键词:
主动防御入侵检测数据捕获数据分析权限控制
Keywords:
initiative defense intrusion detection data capture data analysis permission control
分类号:
TP393
文献标志码:
A
摘要:
主动防御技术是目前网络保护的新热点。提出了一种全新的思路:把主动防御技术引入到信息系统的权限控制中。主要是利用了主动防御技术中的启发式分析技术,采用的具体方法是数据捕获和数据分析技术。对数据包进行捕获分析,与信息系统中报警机制相对比,建立一套更为完善的入侵自动检测报警机制,这样为权限控制增加了主动防御功能。试验结果表明:本方法有利于进一步加强管理信息系统的安全。最后文中分析了加入主动防御技术后权限控制机制的优劣势及改进方法
Abstract:
The active defence technology is the new hot spot of network protection at present.Put forward a totally new idea:to lead the active defence technology into the information systems'access control.The new idea mainly makes use of heuristic analysis technology in the active defense technology.The method adopted is the data capture and data analysis technology.Analyze the data with capturing method,comparing with alarm system in the information systems,building up better automatic intrusion detection alarm system to strengthen access control's active defence capability.The result of experiment indicates that the method is beneficial to further strengthen the safety of the management information systems.At last,also analyze the advantages and disadvantages of access control system after adding active defence technology and put forward the corresponding improving method

相似文献/References:

[1]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
 LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(11):143.
[2]马志远,曹宝香.改进的决策树算法在入侵检测中的应用[J].计算机技术与发展,2014,24(01):151.
 MA Zhi-yuan,CAO Bao-xiang.Application of Improved Decision Tree Algorithm in Intrusion Detection System[J].,2014,24(11):151.
[3]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
 GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(11):148.
[4]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
 LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(11):254.
[5]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
 LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(11):162.
[6]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(11):170.
[7]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
 LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(11):168.
[8]胡琼凯 黄建华.基于协议分析和决策树的入侵检测研究[J].计算机技术与发展,2009,(06):179.
 HU Oiong-kai,HUANG Jian-hua.Intrusion Detection Based on Protocol Analysis and Decision Tree[J].,2009,(11):179.
[9]汪世义.基于优化支持向量机的网络入侵检测技术研究[J].计算机技术与发展,2009,(07):177.
 WANG Shi-yi.Network Intrusion Detection Based on Improved Support Vector Machine[J].,2009,(11):177.
[10]薛俊 陈行 陶军.一种基于神经网络的入侵检测技术[J].计算机技术与发展,2009,(08):148.
 XUE Jun,CHEN Hang,TAO Jun.Technology of Intrusion Detection Based on Neural Network[J].,2009,(11):148.
[11]廖光忠 卢娜.基于Linux的网络入侵防御系统的研究和设计[J].计算机技术与发展,2008,(06):134.
 LIAO Guang-zhong,LU Na.Research and Design of IPS Based on Linux[J].,2008,(11):134.
[12]高建斌 娄渊胜.面向主动防御的无线传感器网络安全框架[J].计算机技术与发展,2012,(09):228.
 GAO Jian-bin,LOU Yuan-sheng.Security Framework Oriented Active Defense for Wireless Sensor Network[J].,2012,(11):228.

备注/Memo

备注/Memo:
湖南省教育科研计划项目资助(09C127)方世林(1981-),男,湖南岳阳人,硕士,讲师,研究方向为计算机网络安全
更新日期/Last Update: 1900-01-01