首页 | 本学科首页   官方微博 | 高级检索  
     检索      

主机攻击分析及安全防护初探
引用本文:肖道举,叶翔,陈晓苏.主机攻击分析及安全防护初探[J].华中科技大学学报(自然科学版),2004,32(3):77-79.
作者姓名:肖道举  叶翔  陈晓苏
作者单位:华中科技大学,计算机科学与技术学院,湖北,武汉,430074;华中科技大学,计算机科学与技术学院,湖北,武汉,430074;华中科技大学,计算机科学与技术学院,湖北,武汉,430074
摘    要:基于攻击者攻击主机的基本步骤,对其中关键步骤在攻击过程中所担当的任务进行了分析,总结出了若干攻击特征.根据所给出的攻击特征,设计了一个主机监测系统,讨论了该监测系统各组成要素的主要功能及监控机制.通过主机监测系统对攻击的监控,增强了主机的实时安全防护能力,提高了主机的安全性.

关 键 词:计算机安全  主机攻击  攻击步骤  主机监测  shell
文章编号:1671-4512(2004)03-0077-03
修稿时间:2003年10月14

Analysis of host attacking and its security protection
Xiao Daoju Ye Xiang Chen Xiaosu Xiao Daoju Assoc. Prof., College of Computer Sci. & Tech.,Huazhong Univ. of Sci. & Tech.,Wuhan ,China..Analysis of host attacking and its security protection[J].JOURNAL OF HUAZHONG UNIVERSITY OF SCIENCE AND TECHNOLOGY.NATURE SCIENCE,2004,32(3):77-79.
Authors:Xiao Daoju Ye Xiang Chen Xiaosu Xiao Daoju Assoc Prof  College of Computer Sci & Tech  Huazhong Univ of Sci & Tech  Wuhan  China
Institution:Xiao Daoju Ye Xiang Chen Xiaosu Xiao Daoju Assoc. Prof., College of Computer Sci. & Tech.,Huazhong Univ. of Sci. & Tech.,Wuhan 430074,China.
Abstract:According to the steps of host attacking, the crucial steps during the process of attacking were analyzed and some attacking features were summarized. Based on the attacking features, host supervision system was designed and the main functions of each element of the system and its supervision mechanism were discussed. By monitoring the host supervision system, the ability of real-time security protection of host was strengthened and the security of host was enhanced.
Keywords:computer security  host attacking  attacking steps  host supervision  shell
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号