首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   0篇
工业技术   3篇
  2014年   1篇
  2004年   2篇
排序方式: 共有3条查询结果,搜索用时 15 毫秒
1
1.
因为网络的复杂性.网络入侵检测系统(NIDS)并不总能准确地判断出什么样的网络信息到达了主机.也不总能判断主机如何去释意这些信息。因此.就TCP/IP协议分析而言,NIDS和主机对数据包的解析存在分歧。入侵者就可以利用这一漏洞逃过NIDS的检测。为了消除基于TCP/IP协议分析的分歧——“模糊性”,这里我们介绍一种简单的解决方法:Active Mapping技术。  相似文献   
2.
随着对网络安全问题的理解日益深入.入侵检测技术得到了迅速的发展.应用防护的概念逐渐被人们所接受.并应用到入侵检测产品中。而在千兆环境中.如何解决应用防护和千兆高速网络环境中数据包线速处理之间的矛盾.成为网络安全技术发展一个新的挑战。  相似文献   
3.
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号