排序方式: 共有191条查询结果,搜索用时 17 毫秒
1.
2.
3.
4.
5.
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors. 相似文献
6.
本刊编辑部 《信息安全与通信保密》2013,(5):4-5
@央视新闻[TP-LINK可能是你家的"小间谍"]国家信息安全漏洞共享平台在其官方网站发布,我们常用的TP-LINK路由器可能存在安全漏洞,QQ密码、网银密码或被泄露。目前已知受影响的路由器型 相似文献
7.
随着计算机的普及使用,网络环境日益复杂,时常出现系统漏洞、黑客入侵等现象,严重威胁网络信息安全。所以对计算机软件中应用安全漏洞检测技术的研究是具有十分重要的意义的。文章在分析计算机软件安全漏洞基本概况的基础上,探讨了安全漏洞检测技术及其加强计算机安全措施。 相似文献
8.
9.
10.
《信息安全与通信保密》2010,(Z1)
微软安全工程中心(MSEC)通过发布更加安全的产品和服务来为微软用户提供保护。MSEC的3个团队配合工作并与微软的其他团队一起,致力于改善IT管理的三大支柱:人、 相似文献