共查询到20条相似文献,搜索用时 78 毫秒
1.
一种基于主动网的安全防御系统 总被引:5,自引:0,他引:5
文章首先对传统的安全防御系统(防火墙和入侵检测系统)研究现状进行了简要的综述,然后通过对现有安全防御系统在主动响应方面的缺陷进行了分析,结合主动网的技术优势,给出了基于安全主动节点的主动安全防御系统概念原型。最后,通过基于主动网的安全防御系统对DDos攻击的防御分析,证明了原型的可行性,并指明了目前研究中存在的问题和今后的工作方向。 相似文献
2.
4.
随着因特网应用的迅速升级,网络安全问题日益严峻。传统的防火墙、入侵检测系统在一定程度上构建了安全防御体系,但由于其自身的不足以及对网络攻击缺乏主动响应功能,并随着网络入侵行为的增加和网络攻击水平的不断提高,尤其是混合攻击技术的发展,单一的防护措施已经不能挡住各种攻击,企事业单位更加需要对网络进行防护,于是引入一种全新的防御技术——入侵防御系统(IPS)已成为必须。 相似文献
5.
防火墙协同防御技术研究 总被引:1,自引:0,他引:1
网络信息安全的意识己被各方接受和认同,防火墙、入侵检测、防病毒、安全审计等安全技术己经得到了广泛的应用。在此基础上,如何构建一个动态的、全方位的安全防护体系,成为网络安全中研究的热点。基于此,该文对以防火墙为中心的协同防御技术做了一定的研究。 相似文献
6.
文章首先对传统的防火墙技术及其局限性做了简要分析,其次设计了基于云计算的入侵检测系统模型,并对其技术实现进行了探讨.该系统可以迅速判断并阻止已知和未知的安全问题,使之在发生之前加以拦截,展示了基于云计算架构的Web内容防护解决方案.本模型可用于进一步阻止目前快速增长且极具动态性的网络威胁,提高了网络整体的安全性能. 相似文献
7.
8.
史卫军 《计算机技术与发展》2005,15(7)
现有单一安全体系面对日益复杂的攻击技术及手段显得无能为力,为此文中提出一种综合安全防御体系,该体系以入侵检测系统为核心,将现有的多种安全技术通过中间件、代理技术等有机地结合起来,最大限度发挥各自的特点,弥补它们的不足,从而有效地解决单一安全层次的局限性,提高系统的整体安全性. 相似文献
9.
现有单一安全体系面对日益复杂的攻击技术及手段显得无能为力,为此文中提出一种综合安全防御体系,该体系以入侵检测系统为核心,将现有的多种安全技术通过中间件、代理技术等有机地结合起来,最大限度发挥各自的特点,弥补它们的不足,从而有效地解决单一安全层次的局限性,提高系统的整体安全性。 相似文献
10.
林鹏 《网络安全技术与应用》2006,(5):35-37
网络系统的应用环境、边界和网络通信三大区域的安全非常重要。只有每一个区域都得到安全保护,整个系统才能安全。每个区域都建立一个相对独立防护体系,通过安全管理中心和密码管理中心综合三个区域防护体系来组建一个综合型网络安全系统,大大提高系统的安全性能。 相似文献
11.
吴亚林 《电脑编程技巧与维护》2008,(17):104-105
信息时代的网络技术迅猛发展,校园网安全问题异常严峻,结合自身教学工作实践阐述了校园网安全的主动式防范体系的构建以及网络安全策略及解决方案。 相似文献
12.
李振汕 《网络安全技术与应用》2012,(6):12-14
作为一种新型的商业计算模式,云计算的虚拟性及国际性特点催生出了许多法律和监管层面的问题。其中跨境法律管辖权、信息监管和隐私保护、计算机犯罪取证等都面临巨大的法律风险。要适应云计算时代的到来,现行的法律制度必将有一个调整的过程,尚有很多问题亟待解决。本文提出一些个人的见解,以期能对云计算的应用普及有所帮助。 相似文献
13.
计算机操作系统作为计算机类各专业基础课程,其教学内容应密切结合新技术。云计算是当前应用最广泛的技术,并有着广泛的发展空间。本文介绍了云计算的概念和对计算机操作系统教学的影响,并分析了现有计算机操作系统教学纲要,然后,进一步说明了云计算中的关键技术并分析与计算机操作系统教学的联系,最后,重点从处理机管理、内存管理和I/O设备管理三个方面系统阐述了云计算对计算机操作系统教学的导向,作为对该门课程教学的初步研究。 相似文献
14.
15.
《Information Security Journal: A Global Perspective》2013,22(4-6):280-294
ABSTRACTData security is a primary concern for the enterprise moving data to cloud. This study attempts to match the data of different values with the different security management strategies from the perspective of the enterprise user. With the help of core ideas on data value evaluation in information lifecycle management, this study extracts usage features and user features from the operating data of the enterprise information system, and applies K-means to cluster the data according to its value. A total of 39,348 records of logon log and 120 records of users from the information system of a ship-fitting manufacturer in China were collected for an empirical study. The functional modules of the manufacturer’s information system are divided into five classes according to their value, which is proven reasonable by the discriminant function obtained via discriminant analysis. The differentiated data security management strategies on cloud computing are formulated for a case study with five types of data to enhance the enterprise’s active cloud computing data security defense. 相似文献
16.
17.
This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The recently available firewalls (i.e., Listed-Rule firewalls) have their limitations in performing the tasks and are inapplicable for working on some networks with huge firewall rule sizes. The Listed-Rule firewall is mathematically tested in this paper to prove that the firewall potentially causes conflict rules and redundant rules and hence leads to problematic network security systems and slow functional speed. To overcome these problems, we show the design and development of Tree-Rule firewall that does not create conflict rules and redundant rules. In a Tree-Rule firewall, the rule positioning is based on a tree structure instead of traditional rule listing. To manage firewall rules, we implement a Tree-Rule firewall on the Linux platform and test it on a regular network and under a cloud environment respectively to show its performance. It is demonstrated that the Tree-Rule firewall offers better network security and functional speed than the Listed-Rule firewall. Compared to the Listed-Rule firewall, rules of the Tree-Rule firewall are easier to be created, especially on a large network such as a cloud network. 相似文献
18.
本文提出了一种云环境下的网络安全处理模型,模型中的每台云服务器都拥有自己的入侵检测系统,并且所有的服务器共享一个异常管理平台,该平台负责报警信息的接收、处理和日志管理.模型采用报警级别动态调整技术和攻击信息共享方法,最大限度地降低了漏报率和服务器遭受同种攻击的可能性,有效提高了检测效率和系统安全水平. 相似文献
19.
李振汕 《网络安全技术与应用》2012,(4):30-32
作为一种新型的商业计算模式,云计算的直用和推广会给用户带来巨大的经济效益,但同时也带来更多的安全风险,而原有的风险分析方法和安全保护模式已不再适用。文章在借鉴传统风险分析方法的基础上,对云环境下的风险分析的主要要素和流程进行定性的研究,以期能起到抛砖引玉的作用。 相似文献
20.
Addressing cloud computing security issues 总被引:3,自引:0,他引:3
Dimitrios ZissisAuthor Vitae Dimitrios Lekkas Author Vitae 《Future Generation Computer Systems》2012,28(3):583-592
The recent emergence of cloud computing has drastically altered everyone’s perception of infrastructure architectures, software delivery and development models. Projecting as an evolutionary step, following the transition from mainframe computers to client/server deployment models, cloud computing encompasses elements from grid computing, utility computing and autonomic computing, into an innovative deployment architecture. This rapid transition towards the clouds, has fuelled concerns on a critical issue for the success of information systems, communication and information security. From a security perspective, a number of unchartered risks and challenges have been introduced from this relocation to the clouds, deteriorating much of the effectiveness of traditional protection mechanisms. As a result the aim of this paper is twofold; firstly to evaluate cloud security by identifying unique security requirements and secondly to attempt to present a viable solution that eliminates these potential threats. This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment. The proposed solution calls upon cryptography, specifically Public Key Infrastructure operating in concert with SSO and LDAP, to ensure the authentication, integrity and confidentiality of involved data and communications. The solution, presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained. 相似文献