Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (2): 63-65    DOI: 10.11925/infotech.1003-3513.2004.02.17
Current Issue | Archive | Adv Search |
Technology and Methods of Invading Detection  about Network Information
Meng Xiaoming
(Information Institute, Guangdong Commercial College, Guangzhou 510320,China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

By the wide spread application of computer network, the behavior of unlawful invading and attacking becomes even more. It critically threatens the safety of network information. It has become an important and urgent subject to make the computer system, network system, and the whole base facilities of information safety, by making detection and safeguard for invading and attacking. This paper,  aiming at the technology and methods of invading detection about network information, discusses and studies their classify, furthermore studies the tending of the technology developing about invading and invading detection.

Key wordsNetwork information      Invading detection      Technology and methods     
Received: 09 June 2003      Published: 06 January 2004
: 

TP39.08

 
Corresponding Authors: Meng Xiaoming     E-mail: mxmme@163.net
About author:: Meng Xiaoming

Cite this article:

Meng Xiaoming. Technology and Methods of Invading Detection  about Network Information. New Technology of Library and Information Service, 2004, 20(2): 63-65.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2004.02.17     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2004/V20/I2/63

1姜泉.IDS:安全新亮点.April.19,2001.计算机世界网,http://www2.ccw.com.cn/01/0114/d/0114d081.asp(Accessed Sep.2,2003)
2钟力,姚兰.网络入侵检测技术.May.20,2000.天极网,http://hanqing.yesky.com/20000520/63746.shtml(Accessed Sep.2,2003)
3潇湘夜雨.计算机网络系统安全漏洞分类研究.Norember,16,2001.中国UNIX技术社区,http://www.chinaunix.net/bbsjh/19/15.html(Accessed Sep.2,2003)
4Shortgun.Windows2000 server入侵监测.November,1,2001.认证信息中心,http://www.sharecenter.net/rz/3/20011101162533.html(Accessed Sep.2,2003)
5书生.基于网络和主机的入侵检测比较.July,9,2002.LinuxAid技术支持中心,http://www.linuxaid.com.cn/articles/1/0/107105308.shtml(Accessed Sep.2,2003)
6王伟编译.反黑尖兵——七种入侵检测系统测试报告.January,24,2003.浓度工作室,http://xpece.nease.net/aqzx/aq074.htm,(Accessed Sept.2,2003)
7Kaka.网络入侵检测步骤及思路.December,21,2001.黑客入门,http://xxpc.free163.net/jiaocheng/2/hacker20.htm,(Accessed Sept.2,2003)
8周军民.追捕“入侵”—入侵检测技术综述.October,30,2001.计算机世界网, http://www2.ccw.com.cn/01/0130/b/0130b022.asp.(Accessed Sep.2,2003)

[1] Wang Shuo, Xu Jian, Liu Ying. Research on Online "Water Army" Detection Methods[J]. 现代图书情报技术, 2014, 30(7): 92-100.
[2] Li Beiwei, Xu Yue, Shan Jimin, Wei Changlong, Zhang Xinqi, Fu Jinxin. Study on Network Information Ecological Chain of Chinese Shopping Websites[J]. 现代图书情报技术, 2013, 29(9): 67-73.
[3] Xu Xin, Yu Fei, Zhang Li. A Method and Its Application of Text Semantic Orientation[J]. 现代图书情报技术, 2011, 27(10): 54-62.
[4] Ouyang Jian. Design and Implementation of Chinese Books Resources Storehouse Platform Based on Open OPAC[J]. 现代图书情报技术, 2008, 24(9): 92-97.
[5] Ouyang Jian. Applying Network Information Mining Technology to Expanding OPAC[J]. 现代图书情报技术, 2008, 24(11): 76-81.
[6] Jiao Jian,Liu Yu,Zheng Heng. Study on Network Information Resource Comprehensive Evaluation Based on Analytic Hierarchy Process and Bayesian Networks[J]. 现代图书情报技术, 2007, 2(9): 66-71.
[7] Zhao Wei,Zhang Xiuhua,Zhang Xiaoqing . Network Information Resource Validity Evaluation Study Based on BP Algorithm[J]. 现代图书情报技术, 2006, 1(7): 52-55.
[8] Wang Haibo,Tang Shanhong. Studies on Organization and Management of Network Information Resources[J]. 现代图书情报技术, 2003, 19(3): 60-63.
[9] Huang Xiaobin. A Study on the Conversion from HTML to XML[J]. 现代图书情报技术, 2003, 19(1): 18-21.
[10] Fan Songlin. Search and Acguisition of Competitive Information in Network[J]. 现代图书情报技术, 2002, 18(6): 44-46.
[11] Zhao Yi,Zhao Xiong,Zhang Chengyu. Analyzing of Evaluating Indicators for Specialized WebSite[J]. 现代图书情报技术, 2002, 18(4): 43-45.
[12] Chen Shunian. Study on Internet Information Classification[J]. 现代图书情报技术, 2002, 18(3): 54-57.
[13] Liu Haimei. Thoughts on Building Internet Information Navigation Database of the Key Disciplines[J]. 现代图书情报技术, 2002, 18(3): 81-83.
[14] Li Xiu. Push-The Key Technology of Improving Network Information Services[J]. 现代图书情报技术, 2001, 17(5): 56-58.
[15] Pi Jiezheng. Discussion on Management of Network Information Resources[J]. 现代图书情报技术, 2001, 17(2): 43-45.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn