首页 | 本学科首页   官方微博 | 高级检索  
     

识别IDS躲避技术-网络安全策略的关键
引用本文:严文涛,张明,徐伟华. 识别IDS躲避技术-网络安全策略的关键[J]. 信息技术与信息化, 2003, 0(1): 21-23
作者姓名:严文涛  张明  徐伟华
作者单位:山东鲁能信通有限公司,济南,250001
摘    要:随着网络技术的发展、网络规模的扩大 ,针对网络和计算机系统的非法入侵水平的不断提高 ,其入侵手段的自动化水平和隐蔽性也越来越高。对入侵攻击的检测与防范 ,保障计算机系统、网络系统及整个信息基础设施的安全已经成为刻不容缓的重要课题。单纯引入某些设备已不能满足当今网络安全的需要。为此本文以网络入侵检测系统为例 ,讨论了一些常用的IDS躲避技术 ,以及如何识破这些技术 ,制定更加细致的安全策略 ,以构造出更加强壮的防护体系

关 键 词:躲避技术  入侵检测  安全策略
修稿时间:2002-11-18

Identify IDS Avoiding Technology-The Key of the Tactics of Network Security
YAN Wen-tao ZHANG Ming XU Wei-hua. Identify IDS Avoiding Technology-The Key of the Tactics of Network Security[J]. Information Technology & Informatization, 2003, 0(1): 21-23
Authors:YAN Wen-tao ZHANG Ming XU Wei-hua
Affiliation:YAN Wen-tao ZHANG Ming XU Wei-hua
Abstract:Along with the development of technology of the network, the enlargements of network size, at network and level constant to raise the illegal invasionses of computer system, it invade the automatic level and even more and more high disguiseses of means. To invading measuring and take precautions against that attack, ensure computer system, network system and whole information already become the very urgent important subject by the securities of infrastructure. Introduce equipments it satisfies to be nowadays need of the network security already while being simple. For this reason this text leave example on detection system with network, it discusses commonly used IDSs shelter from technology and how penetrate these technology, Make it is neither careful security tactics nor in order to constructing and it publishes to be strong shelter system
Keywords:Avoiding technology Invasion Detection Security tactics  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号