首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 171 毫秒
1.
《计算机与网络》2012,(3):104-105
Linux的用户也许听说甚至遇到过一些Linux病毒,这些Linux病毒的原理和发作症状各不相同,所以采取的防范方法也各不相同。  相似文献   

2.
随着LINUX操作系统越来越广泛的使用,针对它的网络安全问题也日益突出,LINUX下病毒也呈现多样性,数量与质量急剧增加。这些病毒以感染Linux的ELF文件居多。ELF文件是Linux下最常用可执行可连接的二进制格式的文件。弄清ELF文件与病毒感染它的原理,对防范Linux下病毒感染与传播是十分有用的。另一方面,与Windows相比,Linux病毒的研究工作不仅起步晚,而且从事Linux病毒研  相似文献   

3.
唐广江 《网友世界》2014,(11):54-54
随着网络的不断发展,网络安全是我们应该时刻注意的问题。Linux操作系统中维护信息安全的方法很多。本文主要从系统启动和登陆的安全性、限制网络访问、Linux病毒的防治、防止攻击和安装补丁方面探讨Linux操作系统安全防范的策略。  相似文献   

4.
谢瑶  潘剑峰  朱明 《计算机工程》2005,31(4):166-168
结合Linux/Unix病毒实例,分析了Linux/Unix系统ELF文件格式病毒的原理,并从5个方面讲述了实现的关键技术:病毒体寄生ELF文件技术,寄主程序入口重定位,病毒体地址无关代码,LKM可重载内核技术以及网络功能的实现。最后,提出了对这一类病毒检测与防范的方法及策略。  相似文献   

5.
Linux系统是类unix的网络操作系统,应用日益广泛,特别是在网络服务器方面,其安全性问题也逐渐突出,受到人们更多的关注。文章针对Linux系统所采用的网络安全机制,提出了切实可行的基于Linux系统的网络安全策略和保护措施。介绍了关闭不必要的服务和端口、进行远程安全连接、防范病毒及利用防火墙技术来保障网络的安全。  相似文献   

6.
提出了-种基于Linux的网络防火墙中协议栈指纹消除的方法,其基本思想是:动态地修改Linux内核的协议数据包处理流程,屏蔽掉操作系统对数链层以上的数据包处理流程,消除了操作系统所固有的协议栈指纹,可以较好地防范黑客对防火墙的攻击。  相似文献   

7.
Linux系统以其自由开源、安全、稳定等特性被企业认可,并成为构筑企业服务器的主流操作系统之一。从Linux系统安装规划、文件系统管理、用户管理、日志管理、进程管理、网络服务与安全、病毒防范与漏洞扫描、入侵检测等方面给出Linux系统安全的构建策略。  相似文献   

8.
提出了一种基于Linux的网络防火墙中协议栈指纹消除的方法,其基本思想是,动态地修改Linux内核的协议数据包处理流程,屏蔽掉操作系统对数链层以上的数据包处理流程,消除了操作系统所固有的协议栈指纹,可以较好地防范黑客对防火墙的攻击。  相似文献   

9.
《计算机与网络》2012,(2):52-53
当心Linux病毒在Linux出现之初,由于其最初的优秀设计,似乎具有先天病毒免疫能力,所以当时有许多人相信不会有针对Linux的病毒出现,但是Linux终于也不能例外。1996年秋,澳大利亚一个叫VLAD的组织用汇编语言编写了据称是Linux系统下的第一个病毒的Staog,它专门感染二进制文件,并通过三种方式去尝试得到root权限。当然,设计Staog病毒只是为了演示和证明Linux有O和的们病但多域可病毒  相似文献   

10.
目前虚拟货币加快了挖矿病毒的传播,这对于拥有超大用户规模的Linux服务器来说是一个很大的安全隐患。概述了挖矿病毒及危害和主要传播途径,主要讲解了Linux服务器在面对挖矿病毒时常见的处置策略和防御策略。这对于Linux服务器的网络安全管理具有参考意义。  相似文献   

11.
当前高性能计算机体系结构呈现多样性特征,给并行应用软件开发带来巨大挑战.采用领域特定语言OPS对高阶精度计算流体力学软件HNSC进行面向多平台的并行化,使用OPS API实现了代码的重构,基于OPS前后端自动生成了纯M PI、OpenM P、M PI+OpenM P和M PI+CUDA版本的可执行程序.在一个配有2块Intel Xeon CPU E5-2660 V3 CPU和1块NVIDIA Tesla K80 GPU的服务器上的性能测试表明,基于O PS自动生成的并行代码性能与手工并行代码的性能可比甚至更优,并且O PS自动生成的GPU并行代码相对于其CPU并行代码有明显的性能加速.测试结果说明,使用OPS等领域特定语言进行面向多平台的计算流体力学并行软件开发是一种可行且高效的途径.  相似文献   

12.
光分组交换(OPS:Optical packet switching)是未来光网络发展的重要方向。光分组交换在单元技术和网络结构上上与传统的网络均有差别,因此对网络管理也提出个全新的要求。深入了解光分组交换网络的管理信息构成和体制,是将光分组交换网络推向实用化的重要基础。本文从分析光分组交换中所特有的管理信息,并结合我们具体的一个光分组交换管理系统,对此类系统的实现进行了探讨。  相似文献   

13.
浅谈计算机病毒及其防范   总被引:1,自引:0,他引:1  
计算机病毒可以渗透到信息社会的各个领域,给计算机系统带来了巨大的破坏和潜在的威胁。为了确保信息的安全与畅通,因此,研究计算机病毒的防范措施已迫在眉睫。本文从计算机病毒的特点入手,来初步探讨对付计算机病毒的方法和措施。  相似文献   

14.
Until now, most results reported for parallelism in production systems (rulebased systems) have been simulation results-very few real parallel implementations exist. In this paper, we present results from our parallel implementation of OPS5 on the Encore multiprocessor. The implementation exploits very finegrained parallelism to achieve significant speed-ups. For one of the applications, we achieve 12.4 fold speed-up using 13 processes. Our implementation is also distinct from other parallel implementations in that we parallelize a highly optimized C-based implementation of OPS5. Running on a uniprocessor, our C-based implementation is 10–20 times faster than the standard lisp implementation distributed by Carnegie Mellon University. In addition to presenting the performance numbers, the paper discusses the details of the parallel implementation-the data structures used, the amount of contention observed for shared data structures, and the techniques used to reduce such contention.  相似文献   

15.
We examine the problem of predicting the timing behavior of knowledge-based systems for real-time applications. In particular, we describe a suite of tools which analyze OPS5 programs to understand their timing properties. First, a graphical representation of an OPS5 program is defined and evaluated. This graph represents the logical control flows of an OPS5 program. Most of our analysis is based on this data structure. Second, we describe a novel tool which verifies that an OPS5 program can terminate in finite time. If the termination of the OPS5 program is not expected, the "culprit" conditions are detected. These conditions are then used to correct the problem by adding extra rules to the original program. Third, another tool is introduced to aid timing analysis of OPS5 programs. This tool generates a set of test data which maximize the program execution time. Other functions are also provided to facilitate the timing analysis.  相似文献   

16.
本文在介绍病毒的存在形式、携带者对象以及传播途径的基础上,提出了一种基于七级防护安全模型的校园网病毒防护解决方案,并按照七级安全模型提出了校园网病毒的防范措施。  相似文献   

17.
基于发布/订阅中间件的时空事件检测研究   总被引:1,自引:1,他引:0  
禚伟  金蓓弘  陈海彪  张利峰 《计算机科学》2012,39(10):99-103,135
摘要:许多物联网应用根据带有时空关系约束的事件决定其下一步的动作.为了支持物联网应用检测这些时空事件,构建了发布/订阅中间件OPS4ST.OPS4ST允许用户在订阅中表达事件之间的多种时序、空间和逻辑关系;同时实现了时空事件的分布式检测,其能高效地检测到用户在订阅中所关心的时空事件是否发生.通过模拟实验评估了系统的性能和开销,实验结果表明,OPS4ST具有令人满意的性能和可接受的开销.  相似文献   

18.
This work proposes a memory-efficient multi-objective optimization algorithm to perform optimal path selection (OPS) in electric vehicles (EVs). The proposed algorithm requires less computational time and executes efficiently on fast-processor-based embedded systems. It is a population-based simulated evolution algorithm that incorporates innovative functions for calculating the goodness of particles and performing the allocation operation. The goodness and allocation operations ensure the exploration of new paths and the preservation of Pareto-optimal solutions. We executed our algorithm on an Intel Celeron processor, which is also used in embedded systems and compared its performance with that of the non-dominated sorting genetic algorithm-II (NSGA-II). Our experiments used real road networks. The comparison shows that on an average, our algorithm found 5.5 % more Pareto-optimal solutions than NSGA-II. Therefore, our proposed algorithm is suitable for performing OPS in EVs.  相似文献   

19.
《Computer》2001,34(5):16-18
Computer technology has advanced in many ways, but not all of them have been welcome. One of the more undesirable has been the ongoing advance of virus technology. Taking advantage of emerging computer technologies and techniques, virus writers come up with new ways to defeat existing security software, infect computers, cause damage, and spread their malicious creations. This has become evident recently with the emergence of several innovative and potentially harmful viruses, e.g., remote control viruses, peer-to-peer viruses, and open source viruses  相似文献   

20.
Novel segmentation methods based on models of deformable active contours are constantly proposed and validated in different fields of knowledge, with the aim to make the detection of the regions of interest standard. This paper propose a new method called Optimum Path Snakes (OPS), a new adaptive algorithm and free of parameters to define the total energy of a active contour model with automatic initialization and stop criteria. In the experimental assessment, the OPS is compared against some approaches commonly used in the following fields, such as vector field convolution, gradient vector flow, and other specialists methods for lung segmentation using thorax computed tomography images. The segmentation of regions with stroke was carried out with methods based on region growing, watershed and a specialist level set approach. Statistical validations metrics using Dice coefficient (DC) and Hausdorff distance (HD) were also evaluated, as well as the processing time. The results showed that the OPS is a promising tool for image segmentation, presenting satisfactory results for DC and HD, and, many times, superior to the other algorithms it was compared with, including those generated by specialists. Another advantage of the OPS is that it is not restricted to specific types of images, neither applications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号