首页 | 本学科首页   官方微博 | 高级检索  
     

绕过防火墙的攻击与防范
引用本文:李睿.绕过防火墙的攻击与防范[J].电脑与信息技术,2014,22(6):37-41.
作者姓名:李睿
作者单位:阿坝师范高等专科学校网络管理中心,四川省汶川县,623002
摘    要:防火墙已经成为网络安全领域非常重要的技术之一,然而随着攻击手段的日新月异,许多攻击都能绕过防火墙进行入侵攻击,而防火墙本身对于这种攻击无能为力,这对网络带来巨大的安全隐患。文章介绍了防火墙的基本知识,分析了绕过防火墙的攻击手段,最后结合入侵检测技术研究防范绕过防火墙的攻击。

关 键 词:防火墙  网络安全  入侵检测

Bypass Firewall Attack and Defense
LI Rui.Bypass Firewall Attack and Defense[J].Computer and Information Technology,2014,22(6):37-41.
Authors:LI Rui
Affiliation:LI Rui (Network Management Center, ABa Teacher's College, Wenchuan 623002, China)
Abstract:Firewall has become one of the most important technologies in network security field As the means of attack become more and more advanced, many attacks can bypass firewall and launch attacks That attacks take a serious threat to computer network security. This paper introduces the basic knowledge of firewall. analyzes the bypass firewall attack means and researches the intrusion detection technique to prevent the bypass firewall attack.
Keywords:firewall  network security  intrusion detection
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号