首页 | 官方网站   微博 | 高级检索  
     

基于PKI的网络边界安全监控方法
引用本文:邹翔,刘浩,王福.基于PKI的网络边界安全监控方法[J].计算机工程,2010,36(13):140-142.
作者姓名:邹翔  刘浩  王福
作者单位:公安部第三研究所信息网络安全公安部重点实验室国家反计算机入侵与防病毒研究中心,上海,200031
基金项目:国家"863"计划基金资助项目 
摘    要:针对网络边界安全防御的需求和特点,提出一种基于PKI技术的网络边界安全监控方法。该方法结合基于PKI的身份认证机制、入侵检测技术与VPN技术,通过对网络流量和系统日志的关联分析,能够在实时发现入侵行为的同时,准确定位入侵来源并实时阻断攻击,相比通用的特征检测和异常检测方法具有更强的准确性和可用性。

关 键 词:网络边界  安全监控  入侵检测  公钥基础设施

Network Border Security Monitor Method Based on PKI
ZOU Xiang,LIU Hao,WANG Fu.Network Border Security Monitor Method Based on PKI[J].Computer Engineering,2010,36(13):140-142.
Authors:ZOU Xiang  LIU Hao  WANG Fu
Affiliation:(National Research Center for Anti-Computer Invasion and Virus Prevention, Key Laboratory for Information and Network Security of Ministry of Public Security, the Third Research Institute of Ministry of Public Security, Shanghai 200031)
Abstract:This paper proposes a network border security monitor method based on Public Key Infrastructure(PKI) according to the requirement and characteristic of network border security protection. The technique combines identity authentication mechanism based on PKI, intrusion detection technology and VPN technology. It can accurately locate the origin of intrusion and prevent attacks soon after real-time detection of intrusion behaviors via association analysis of network traffic and system log. As a result, it has higher accuracy and usability than general signature detection and abnormal detection technique.
Keywords:network border  security monitor\ intrusion detection  Public Key Infrastructure(PKI)
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号