Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (6): 67-70    DOI: 10.11925/infotech.1003-3513.2004.06.18
Current Issue | Archive | Adv Search |
The Application Research in the Network Security of the Library of the Intrusion Detection System
Wang Zunxin   Cong Luli
(Shandong University of Technology Library, Zibo 255049, China)
Export: BibTeX | EndNote (RIS)      

The intrusion detection system as one of the key technology while auditting safely,is the important component of network safe protection。Intrusion detection system as a kind of positive safe protection technology,proceed from angle of three-dimensional depth、multi-level defence of network security, people paid close attention to the intrusion detection system。This paper described to the function、composition、classification of the intrusion detection system,and has carried on research in the application in the network security of the library of intrusion detection system.

Key wordsIntrusion detection system(IDS)      Network security      Network security of the library     
Received: 23 February 2004      Published: 25 June 2004


Corresponding Authors: Wang Zunxin     E-mail:
About author:: Wang Zunxin,Cong Luli

Cite this article:

Wang Zunxin,Cong Luli. The Application Research in the Network Security of the Library of the Intrusion Detection System. New Technology of Library and Information Service, 2004, 20(6): 67-70.

URL:     OR

1 李镇江等. IDS 入侵检测系统研究. 计算机工程, 2001 (4)
2 史卫国. 对维护网络安全运用入侵检测技术的研究. 图书情报工作, 2002 (10)
3 李昀, 李伟华. 分布式入侵检测系统的研究与实现. 计算机工程与应用, 2003 (4)
4 刘春颂等. 基于网络的入侵检测系统及其实现. 计算机应用, 2003(2)
5 周建国等. 计算机网络入侵检测系统的研究. 计算机工程, 2003 (2)
6 罗光春等. 入侵检测系统的历史、现状与研究进展. 计算机应用研究, 2003 (8)
7 薛英花等. 入侵检测系统研究. 计算机工程与应用, 2003 (1)

[1] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[2] Miao Yuanzhao. Discussion on Security Monitor to the Computer Network System of the College Digitalization Library Based on Open Source Software[J]. 现代图书情报技术, 2007, 2(6): 91-95.
[3] Hu Zhizhou. Creation for Firewall of the Library Network Using Iptables[J]. 现代图书情报技术, 2005, 21(4): 34-36.
[4] Wu Zhenxin,Li Guangjian,Xu Yandong,Ma Ming. Building a Network Security System for a Library[J]. 现代图书情报技术, 2005, 21(10): 67-69.
[5] Yu Xiaozheng,Gu Hao,Chen Dingquan. Study on the Integrated Framework for E-Government Network Security[J]. 现代图书情报技术, 2004, 20(6): 71-75.
[6] Jiang Chuanju. The Function of Log Analysis in Network Security[J]. 现代图书情报技术, 2004, 20(12): 58-60.
[7] Zhou Huai. The Analysis and Advices of Security Holes in ASP Web Sites[J]. 现代图书情报技术, 2004, 20(11): 90-92.
[8] Liu Xing. NT服务器的安全维护与故障排除[J]. 现代图书情报技术, 2003, 19(6): 85-87.
[9] Jiang Jihong. The Network s Encryption and Authentication Technique[J]. 现代图书情报技术, 2003, 19(4): 78-80.
[10] Shen Wenyu,Liu Zongren. Clear Method and Countermeasure of Trojan Horse[J]. 现代图书情报技术, 2002, 18(2): 92-93.
[11] Song Xiaowen. The Network Information Security in China[J]. 现代图书情报技术, 2002, 18(1): 53-55.
[12] Wang Huawei. The NAT Solution of Computer Network of Library[J]. 现代图书情报技术, 2001, 17(5): 27-28.
[13] Xu Jinjun,Ni Bo. Research of Information Network Security[J]. 现代图书情报技术, 2001, 17(1): 60-61.
[14] Wang Yong,Ni Bo,Yuan Qinjian, Zhu Weiyong,Liang Wei. Advances of Computer Network Technology in 20 Century[J]. 现代图书情报技术, 2000, 16(6): 14-17.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938