首页 | 本学科首页   官方微博 | 高级检索  
     

对网络安全问题的探讨
引用本文:李艺,李新明.对网络安全问题的探讨[J].计算机工程与设计,2004,25(7):1137-1139.
作者姓名:李艺  李新明
作者单位:装备指挥技术学院,北京,101416
摘    要:分析了黑客经过侦察、扫描、攻击、维护访问权和掩盖踪迹等几个阶段实施攻击的一般过程和攻击工具的新特点,分析了系统脆弱性研究的概况,说明了源码分析、反汇编、调试、网络数据包分析、黑箱测试法、基本原理分析法和类推法等发现系统脆弱性的方法,提出了一些加强系统安全的措施。

关 键 词:网络安全  黑客  攻击  脆弱性
文章编号:1000-7024(2004)07-1137-03

Penetration to network security
LI Yi,LI Xin-ming.Penetration to network security[J].Computer Engineering and Design,2004,25(7):1137-1139.
Authors:LI Yi  LI Xin-ming
Abstract:The procedure of network attacking by hacker is analyzed which is basically divided into several phases of scouting, scanning, attacking, holding access privilege and deleting trace. The research on system vulnerability is briefly analyzed, and the methodology of hunting system vulnerabilities is also described which includes source code auditing, disassembly, debugging, network traffic analysis, black-box security testing, basic principal analysis and analogy. Some integrated measures on security management is also given to enforce the system security at the last.
Keywords:network  security  hacker  attack  vulnerability  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号