共查询到20条相似文献,搜索用时 15 毫秒
1.
Fred Cohen 《Network Security》1999,1999(4):6-13
Computing operates in an almost universally networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
2.
3.
核函数是SVM的关键技术,核函数的选择将影响着支持向量机的学习能力和泛化能力。各个普通核函数各有利弊,在分析各个普通核函数的基础上,采用了一种新的组合核函数,它既具有很好的泛化能力,也具有很好的学习能力,并将其构造的支持向量机应用到网络安全的风险评估中,与普通核函数构造的支持向量机的评估效果进行比较。结果表明组合核函数支持向量机不仅提高了分类速度,而且具有较高的分类精度。 相似文献
4.
陈鹏 《网络安全技术与应用》2014,(7):120-120
随着科学技术和网络信息技术的飞速发展,越来越多的网络信息安全问题逐渐出现.本文主要研究了网络信息安全和网络安全之间的关系,并且对如何创造安全的网络环境提出了几点建议. 相似文献
5.
Fred Cohen 《Network Security》1998,1998(10):10-14
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. This series of articles takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
6.
《Information Security Technical Report》1997,2(3):66-79
This article discusses common vulnerabilities associated with Unix networking and how attackers could exploit these vulnerabilities. Having identified a range of vulnerabilities it then details some of the configurations and countermeasures that can be used to secure a host against them. 相似文献
7.
8.
As networks become large and heterogeneous, network administrators need efficient tools for monitoring network activities and enforcing global security. In open environments such as universities and research organisations, it is rather difficult to prevent access to core network resources without restricting users’ freedom.Ntop is an open-source web-based traffic measurement and monitoring application written by the authors and widely available on the Internet. This paper shows how ntop can also be effectively used for network security as it is able to identify potential intruders and security flaws, as well as discover misconfigured or faulty applications that generate suspicious traffic. 相似文献
9.
Fred Cohen 《Network Security》1997,1997(11):9-11
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. This series of articles takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
10.
对网络安全问题的探讨 总被引:3,自引:9,他引:3
分析了黑客经过侦察、扫描、攻击、维护访问权和掩盖踪迹等几个阶段实施攻击的一般过程和攻击工具的新特点,分析了系统脆弱性研究的概况,说明了源码分析、反汇编、调试、网络数据包分析、黑箱测试法、基本原理分析法和类推法等发现系统脆弱性的方法,提出了一些加强系统安全的措施。 相似文献
11.
曾金繁 《网络安全技术与应用》2012,(2):64-66
TCP/IP协议的开放性创造了互联网高速发展,同时因其固有的安全缺陷为用户带来了越来越多的安全问题。本文从目前国内外存在的网络安全问题出发,详细介绍了局域网络安全现状和存在的安全问题,提出了较为科学的安全防护措施。 相似文献
12.
13.
14.
15.
胡坚 《网络安全技术与应用》2014,(6):125-125,127
随着计算机网络技术的不断发展,已经无所不在的影响着社会的政治、经济、文化、军事、意识形态和社会生活等各个方面,网络在给人们生活、工作带来各种便利的同时,随之而来的是各种网络安全问题。本文分析了目前计算机网络存在的主要问题,并针对这些问题提出了一些网络安全的防范措施,使大家认识并了解这些漏洞的危害,从而更好的保护自己的计算机。 相似文献
16.
Fred Cohen 《Network Security》1997,1997(5):14-18
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. This series of articles takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
17.
校园网络安全分析与安全体系方案设计 总被引:1,自引:0,他引:1
分析了校园网络面临的安全风险,针对校园网络面临的安全风险,提出了基于防火墙网络访问控制、入侵检测技术、虚拟专用网技术、内部虚拟局域网(VLAN)划分、终端安全管理的安全体系解决方案,并对ICMP攻击、TCP SYN FLOOD攻击和Smurf攻击进行了安全测试.测试表明:该方案能有效防御攻击,具备静态的被动的防御和主动防御功能,能够给予校园网络较大的安全防护. 相似文献
18.
E. M. Gabidulin N. I. Pilipchuk B. Honary H. Rashwan 《Problems of Information Transmission》2013,49(2):179-191
We consider a communication network with random network coding which can be attacked by adversaries of two types. One of them can wiretap original packets outgoing from source to destination. The other can insert its own packets into information flow, which are wrong messages for the receiver. To provide secure communication, we use a scheme based on combining the GPT (Gabidulin-Paramonov-Tretjakov) public key cryptosystem and SKK (Silva-Kschischang-Koetter) codes. Encrypted packets are transmitted to the destination through wired channels. Performance of this system is investigated. The main result is that the proposed scheme is secure against wiretapping and insertion attacks under some conditions which depend on rank code parameters. 相似文献
19.