无线网络安全外文文献

无线网络安全外文文献
无线网络安全外文文献

文献信息

作者: Abiona, Olatunde; Oluwaranti, Adeniran;

出版物名称: International Journal of Communications, Network and System Sciences

卷: 6;期: 10;页: 443-450;年份: 2015

ISSN: 19133723

Wireless Network Security: The Mobile Agent Approach

Abiona, Olatunde; Oluwaranti, Adeniran;

ABSTRACT

The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless net-works. The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open to man-in-the-middle attacks. These characteristics make traditional cryptographic mechanism provide weak security for the wireless environment. We have proposed the use of mobile agents to provide dependable Internet services delivery to users, this will guarantee secure authentication in wireless networks and we examine the feasibility of our solution and propose a model for wireless network security.

Keywords: Wireless Network Security; Mobile Agent; Authentication

1. Introduction

Wireless networks has been experiencing an explosive growth similar to the Internet, this is due largely to the attractive flexibility enjoyed by both users and service provider. Some of the benefits are: network coverage without the cost of deploying and maintaining wires, mobility support and roaming which grant the users "anytime", anywhere access to network. While the emer- gence of these new technologies can enable truly ubiqui- tous Internet access, it also raises issues with the de- pendability of the Internet service delivered to users. Ba- sically Wireless Local Area Network (WLAN) can oper- ate in two modes, the infrastructure based and the ad hoc networks. Many organizations are deploying the infra-structure based wireless network to provide connectivity to places difficult to reach by cabling, to complement the existing wired networks. A lot of attention has been given to the provision of these wireless network solutions, but little attention has been given to the provision of adequate security for the emerging wireless networks making these networks prone to traditional link-layer attacks readily available to anyone within the range of the wireless network.

Wireless network security is more concentrated and complex than security of wired networks because wire- less is broadcast in nature, making it possible for anyone within the range of a wireless device to intercept the packets sent without interrupting the flow of data be- tween the wireless device and the access point. User au- thentication is the best safeguard against the risk of un- authorized access to the wireless network. The security features for mobile communication system include: con- fidentiality on the air interface, anonymity of the user and, most importantly, authentication of the user to the system in order to prevent fraudulent use of the system [1]. Wireless network security is different from wired network security primarily because it gives potential at-

tackers easy transport medium access. This access sig- nificantly increases the threat that any security architect- ture must address. Unfortunately, the early IEEE 802.11 standards failed to account for it [2]. Hence the security schemes in wired network can not be used directly in wireless network.

A typical wireless infrastructure network consists of a wireless device known as a stations (STAs) communi-cating with a centralized stationary Access Point (AP) over a wireless channel. Security threats against the wired network are equally applicable to the wireless net- works, but the wireless networks suffer a number of ad- ditional vulnerabilities that make it more challenging to secure [3].

* Open wireless medium: The security threats of mes- sage eavesdropping and injection are universal in any network; however, they are more severe in wireless networks due to open wireless medium.

* Limited bandwidth: Wireless networks are particu- larly vulnerable to denial-of-service (DoS) attacks and in-band signaling.

* System Complexity: Wireless networks are far more complex than the wired networks due to the special needs for mobility support and efficient channel uti- lization.

Mobile Agent (MA) is an effective paradigm for dis- tributed applications and is particularly attractive in a dynamic network environment involving partially con- nected computing elements. MA is defined as a software component which is either a thread or a code carrying its execution state to perform the network function or an application [4]. MA can act as a middleware and perform network and other application related functions based on the underlying infrastructure: fixed wired networks, wireless cellular network or mobile ad hoc network [4]. MA paradigm is an emerging technology for developing applications in open, distributed and heterogeneous en- vironment like the Internet. Agents have the ability to decide autonomously where to migrate to after they are dispatched. MA technology offers several advantages in many application areas, such as e-commerce, mobile computing, network management and information re- trieval [4]. MAs are designed to execute locally on data at their destination, thus reducing network traffic and latency. Furthermore, MA asynchronous interaction can provide efficient solution in the case of unreliable and low bandwidth connection, to support mobile users that could disconnect while their agent still roam in the net- work. However, security is a major technical obstacle to wider acceptance and is of fundamental concern for mo- bile agent based system [4]. We explore the possibilities of using MAs for the provisioning of dependable Internet services delivery that meets the user's requirement in terms of security, by providing secure authentication in wireless networks.

The rest of the paper is organized as follows: Section 2 presents security challenges in wireless network. Sec- tion 3 presents wireless network security approaches. In Section 4, mobile agents and wireless network were dis-cussed. In Section 5, mobile agents and security were dis- cussed. In Section 6, mobile agent authentication scheme was discussed and the paper finally concluded in Section 7.

2. Security Challenges in Wireless Networks

Securing wireless networks posses unique challenges compared to a wired network due to the open nature of the access medium. In general, wireless networks suffer from security threats of wired networks and additional vulnerabilities making it more challenging to secure. Wireless network security is different from wired net-work security primarily because it gives potential attack-ers easy transport medium access. Hence the security schemes in wired network can not be used directly in wireless network. The fact that data are being broadcast via radio waves rather than transmitted over a wire in-troduces security challenges namely: * How can you prevent user credentials from being hijacked during authentication negotiation?

* Once authentication is complete, how can you protect the privacy of the data being transmitted between cli-ent and access point? And finally,

* How can you make sure the authorized user connects to the right network?

The concerns are that of authentication, data confiden-tiality and privacy, data integrity, availability and rogue access point.

Authentication-Most password-based protocols in use today rely on a hash of the password with a random chal-lenge. The server issues a challenge, the client hashes that challenge with the password and forwards a response to the server, and the server validates that response against the user's password retrieved from its database. Legacy password protocols are easily subjected to eaves- dropping and man-in-the-middle attacks. An eavesdrop-ping attacker can easily mount a dictionary attack against such password protocols. A man-in-the-middle attacker can pass through the entire authentication, and then hi-jack the connection and act as the user.

Data Privacy-Another concern is the security of the wireless data connection between the client and access point subsequent to authentication. While client and ac- cess point could easily negotiate keys subsequent to au- thentication, if the keys are not cryptographically related prior to the authentication, the data session would be subject to a man-in-the-middle attack. Therefore it is incumbent upon the authentication negotiation to result in keys that may be distributed to both client and access point to allow the subsequent data connection to be en- crypted.

Rogue Access Point-A final security challenge results from the possibility that someone could install a WLAN access point and network and fool your user into doing work on that network. Rogue access points are those in- stalled by users without coordinating with IT unit. Be-cause access points are inexpensive and easy to install, rogue installations are becoming more common.

Limited Bandwidth-The networks that connect hand-held wireless devices such as phones and Personal Digi-tal Assistants (PDAs) suffer from low bandwidth and high incidence of network errors. Mobility can also result in the loss or degradation of wireless connections [5]. Limited communication bandwidth may also be a target for malicious attacks such as DoS attack. To implement such attack, the malicious node may send vicious queries flooding to target nodes to consume the bandwidth and occupy the shared wireless media, making the network services unavailable to other nodes [4]. Apart from the limitation in bandwidth constraint, each node in a wire-less communication and mobile computing has limited transmission range and limited power supply.

System Complexity-Wireless networks are far more complex than the wired networks due to the special needs for mobility support and efficient channel utilization. It should be noted that each complexity in the system, adds additional security vulnerability to the wireless networks especially for systems with large user population and complex infrastructure [3].

3. Wireless Network Security Approaches

The Wireless Equivalent Privacy (WEP) protocol [3] was the first link-layer security mechanism introduced in 802.11 to provide a security level compared to that of with a physical wire. Unfortunately it is also fairly inse-cure. Hackers can easily find out the password and then do anything they want with your network. The software for doing this is widely available. Unfortunately, several security flaws in WEP were soon identified, which can be exploited to defeat its security goals [6].

9个常用的国外英文文献数据库

9个常用的国外英文论文文献数据库 9个论文文献数据库,科研搬砖,阅读涨姿势,论文写作小帮手!先说说什么是数据库:学术科研中说的「数据库」和「文献数据库」,往往是一种的形式,这个的贮存了大量文献数据(比如论文)可以简单的理解为一个网络图书馆。 数据库中的论文往往都是耗费了大量的时间和精力整理出来的,还有很多是需要购买才可以放在互联网上的,再加上维护这个本身就耗费颇多,因此这些数据库通常不是完全免费的,你可以在上面免费查找文献,浏览摘要等简介容,但是如果你要下载文献,就要付钱。 大学因为科研和教学需要,常年要下载大量的论文材料,所以就会和数据库的经营者签订很多协议,例如包年,就是给一定量的钱,然后就可以无限制下载论文。也有按照下载的数量进行计费。那英语作为世界第一学术语言,有哪些数据库是值得大家分享的呢?1、Wiley InterScience(英文文献期刊)Wiley InterScience是John Wiely & Sons公司创建的动态在线容服务,1997年开始在网上开通。通过InterScience,Wiley公司以许可协议形式向用户提供在线访问全文容的服务。Wiley InterScience收录了360多种科学、工程技术、医疗领域及相关专业期刊、30多种大型专业

参考书、13种实验室手册的全文和500多个题目的Wiley 学术图书的全文。网址:onlinelibrary.wiley./其中被SCI 收录的核心期刊近200种。期刊具体学科划分为:Business,Finance & Management (商业、金融和管理)、Chemistry (化学)、Computer Science(计算机科学)、Earth Science (地球科学)、Education (教育学)、Engineering (工程学)、Law(法律)、Life and Medical Sciences (生命科学与医学)、Mathematics and Statistics(数学统计学)、Physics (物理)、Psychology (心理学)。 2. ICPSRICPSR全称为Inter-university Consortium for Political and Social Research,即美国校际社会科学数据共享联盟。成立于1962年,位于美国密西根大学安娜堡分校(University of Michigan- Ann Arbor, 1817-),储存超过17000种调查研究资料,如军队官兵总名册,遗嘱、遗嘱查验与税收纪录,是现在世界上最大的社会科学数据中心,拥有600多个成员机构,包括大学和各种研究中心。网址:https://www.360docs.net/doc/4b11716237.html,/icpsrweb/landing.jsp其中400多个成员机构在美国,我国的国家人口发展研究战略课题组,大学,大学,科技大学,浸会大学也是成员之一。 3. IEEE 电气电子工程师学会IEEE(Institute of Electrical & Electronics Engineers)是电子信息领域最著名的跨国性学

计算机网络安全文献综述

计算机网络安全综述学生姓名:李嘉伟 学号:11209080279 院系:信息工程学院指导教师姓名:夏峰二零一三年十月

[摘要] 随着计算机网络技术的快速发展,网络安全日益成为人们关注的焦点。本文分析了影响网络安全的主要因素及攻击的主要方式,从管理和技术两方面就加强计算机网络安全提出了针对性的建议。 [关键词] 计算机网络;安全;管理;技术;加密;防火墙 一.引言 计算机网络是一个开放和自由的空间,但公开化的网络平台为非法入侵者提供了可乘之机,黑客和反黑客、破坏和反破坏的斗争愈演愈烈,不仅影响了网络稳定运行和用户的正常使用,造成重大经济损失,而且还可能威胁到国家安全。如何更有效地保护重要的信息数据、提高计算机网络的安全性已经成为影响一个国家的政治、经济、军事和人民生活的重大关键问题。本文通过深入分析网络安全面临的挑战及攻击的主要方式,从管理和技术两方面就加强计算机网络安全提出针对性建议。

二.正文 1.影响网络安全的主要因素[1] 计算机网络安全是指“为数据处理系统建立和采取的技术和管理的安全保护,保护计算机硬件、软件数据不因偶然和恶意的原因而遭到破坏、更改和泄漏”。计算机网络所面临的威胁是多方面的,既包括对网络中信息的威胁,也包括对网络中设备的威胁,但归结起来,主要有三点:一是人为的无意失误。如操作员安全配置不当造成系统存在安全漏洞,用户安全意识不强,口令选择不慎,将自己的帐号随意转借他人或与别人共享等都会给网络安全带来威胁。二是人为的恶意攻击。这也是目前计算机网络所面临的最大威胁,比如敌手的攻击和计算机犯罪都属于这种情况,此类攻击又可以分为两种:一种是主动攻击,它以各种方式有选择地破坏信息的有效性和完整性;另一类是被动攻击,它是在不影响网络正常工作的情况下,进行截获、窃取、破译以获得重要机密信息。这两种攻击均可对计算机网络造成极大的危害,并导致机密数据的泄漏。三是网络软件的漏洞和“后门”。任何一款软件都或多或少存在漏洞,这些缺陷和漏洞恰恰就是黑客进行攻击的首选目标。绝大部分网络入侵事件都是因为安全措施不完善,没有及时补上系统漏洞造成的。此外,软件公司的编程人员为便于维护而设置的软件“后门”也是不容忽视的巨大威胁,一旦“后门”洞开,别人就能随意进入系统,后果不堪设想。

9个常用的国外英文论文文献数据库

9个常用的国外英文论文文献数据库9个论文文献数据库,科研搬砖,阅读涨姿势,论文写作小帮手!先说说什么是数据库:学术科研中说的「数据库」和「文献数据库」,往往是一种网站的形式,这个网站的贮存了大量文献数据(比如论文)可以简单的理解为一个网络图书馆。 数据库中的论文往往都是耗费了大量的时间和精力整理出 来的,还有很多是需要购买版权才可以放在互联网上的,再加上维护这个网站本身就耗费颇多,因此这些数据库通常不是完全免费的,你可以在上面免费查找文献,浏览摘要等简介内容,但是如果你要下载文献,就要付钱。 大学因为科研和教学需要,常年要下载大量的论文材料,所以就会和数据库的经营者签订很多协议,例如包年,就是给一定量的钱,然后就可以无限制下载论文。也有按照下载的数量进行计费。那英语作为世界第一学术语言,有哪些数据库是值得大家分享的呢?1、Wiley InterScience(英文文献期刊)Wiley InterScience是John Wiely & Sons公司创建的动态在线内容服务,1997年开始在网上开通。通过InterScience,Wiley 学术期刊集成全文数据库(Academic Search Premier,简称ASP):包括有关生物科学、工商经济、资讯科技、通讯传播、工程、教育、艺术、文学、医药学等领域的七千多种期刊,

其中近四千种全文刊。 学术研究图书馆(Academic Research Library,简称ARL)综合参考及人文社会科学期刊论文数据库,涉及社会科学、人文科学、商业与经济、教育、历史、传播学、法律、军事、文化、科学、医学、艺术、心理学、宗教与神学、社会学等学科,收录2,300多种期刊和报纸,其中全文刊占三分之二,有图像。可检索1971年来的文摘和1986年来的全文。商业信息数据库(ABI/INFORM)ABI即为Abstracts of Business Information的缩写,世界着名商业及经济管理期刊论文数据库,收录有关财会、银行、商业、计算机、经济、能源、工程、环境、金融、国际贸易、保险、法律、管理、市场、税收、电信等主题的1,500多种商业期刊,涉及这些行业的市场、企业文化、企业案例分析、公司新闻和分析、国际贸易与投资、经济状况和预测等方面,其中全文刊超过50%,其余为文摘,有图像。 医学电子期刊全文数据库(ProQuest Medical Library)该数据库收录有220种全文期刊,文献全文以PDF格式或文本加图像格式存储;收录范围包括所有保健专业的期刊,有护理学、儿科学、神经学、药理学、心脏病学、物理治疗及其它方面。 6. BlackwellBlackwell出版公司是世界上最大的期刊出版商之一(总部设在英国伦敦的牛津),以出版国际性期刊为主,

网络安全外文翻译文献

网络安全外文翻译文献 (文档含英文原文和中文翻译) 翻译: 计算机网络安全与防范 1.1引言 计算机技术的飞速发展提供了一定的技术保障,这意味着计算机应用已经渗透到社会的各个领域。在同一时间,巨大的进步和网络技术的普及,社会带来了巨大的经济利润。然而,在破坏和攻击计算机信息系统的方法已经改变了很多的网络环境下,网络安全问题逐渐成为计算机安全的主流。

1.2网络安全 1.2.1计算机网络安全的概念和特点 计算机网络的安全性被认为是一个综合性的课题,由不同的人,包括计算机科学、网络技术、通讯技术、信息安全技术、应用数学、信息理论组成。作为一个系统性的概念,网络的安全性由物理安全、软件安全、信息安全和流通安全组成。从本质上讲,网络安全是指互联网信息安全。一般来说,安全性、集成性、可用性、可控性是关系到网络信息的相关理论和技术,属于计算机网络安全的研究领域。相反,狭隘“网络信息安全”是指网络安全,这是指保护信息秘密和集成,使用窃听、伪装、欺骗和篡夺系统的安全性漏洞等手段,避免非法活动的相关信息的安全性。总之,我们可以保护用户利益和验证用户的隐私。 计算机网络安全有保密性、完整性、真实性、可靠性、可用性、非抵赖性和可控性的特点。 隐私是指网络信息不会被泄露给非授权用户、实体或程序,但是授权的用户除外,例如,电子邮件仅仅是由收件人打开,其他任何人都不允许私自这样做。隐私通过网络信息传输时,需要得到安全保证。积极的解决方案可能会加密管理信息。虽然可以拦截,但它只是没有任何重要意义的乱码。 完整性是指网络信息可以保持不被修改、破坏,并在存储和传输过程中丢失。诚信保证网络的真实性,这意味着如果信息是由第三方或未经授权的人检查,内容仍然是真实的和没有被改变的。因此保持完整性是信息安全的基本要求。 可靠性信息的真实性主要是确认信息所有者和发件人的身份。 可靠性表明该系统能够在规定的时间和条件下完成相关的功能。这是所有的网络信息系统的建立和运作的基本目标。 可用性表明网络信息可被授权实体访问,并根据自己的需求使用。 不可抵赖性要求所有参加者不能否认或推翻成品的操作和在信息传输过程中的承诺。

SQL数据库英文文献及翻译

SQL数据库英文文献及翻译 The fact that you are reading a book on SQL indicates that you, somehow, need to interact with databases. SQL is a language used to do just this, so before looking at SQL itself, it is important that you understand some basic concepts about databases and database technologies. Whether you are aware of it or not, you use databases all the time. Each time you select a name from your email address book, you are using a database. If you conduct a search on an Internet search site, you are using a database. When you log into your network at work, you are validating your name and password against a database. Even when you use your ATM card at a cash machine, you are using databases for PIN number verification and balance checking. But even though we all use databases all the time, there remains much confusion over what exactly a database is. This is especially true because different people use the same database terms to mean different things. Therefore, a good place to start our study is with a list and explanation of the most important database terms.Reviewing Basic Concepts What follows is a very brief overview of some basic database concepts. It is intended to either jolt your memory if you already have some database experience, or to provide you with the absolute basics, if you are new to databases. Understanding databases is an important part of mastering SQL, and you might want to find a good book on database fundamentals to brush up on the subject if needed. What Is a Database? The term database is used in many organized fashion. The simplest way to think of it is to imagine a database as a filing cabinet. The filing cabinet is simply a physical location to store data, regardless of what that data is or how it is organized Database A container (usually a file or set of files) to store organized data. Misuse Causes Confusion People often use the term database to refer to the database software they are running. This is incorrect, and it is a source of much confusion. Database software is actually called the Database Management System (or DBMS). The database is the container created and manipulated via the DBMS. A database might be a file stored on a hard drive, but it might not. And for the most part this is not even significant as you never access a database directly anyway; you always use the DBMS and it accesses the database for you. Tables When you store information in your filing cabinet you don't just toss it in a drawer. Rather, you create files within the filing cabinet, and then you file related data in specific files. In the database world, that file is called a table. A table is a structured file that can store data of a specific type. A table might contain a list of customers, a product catalog, or any other list of information. Table A structured list of data of a specific type. The key here is that the data stored in the table is one type of data or one list. You would never store a list of customers and a list of orders in the same database table. Doing so would make subsequent retrieval and access difficult. Rather, you'd create two tables, one for each list. Every table in a database has a name that identifies it. That name is always unique—meaning no other table in that database can have the same name. Table Names What makes a table name unique is actually a combination of several things including the database name and table name. Some databases also use the name of the database owner as part of the unique name. This means that while you cannot use the same table name

网络安全中的中英对照

网络安全中的中英对照 Access Control List(ACL)访问控制列表 access token 访问令牌 account lockout 帐号封锁 account policies 记帐策略 accounts 帐号 adapter 适配器 adaptive speed leveling 自适应速率等级调整 Address Resolution Protocol(ARP) 地址解析协议Administrator account 管理员帐号 ARPANET 阿帕网(internet的前身) algorithm 算法 alias 别名 allocation 分配、定位 alias 小应用程序 allocation layer 应用层 API 应用程序编程接口 anlpasswd 一种与Passwd+相似的代理密码检查器 applications 应用程序 ATM 异步传递模式

audio policy 审记策略 auditing 审记、监察 back-end 后端 borde 边界 borde gateway 边界网关 breakabie 可破密的 breach 攻破、违反 cipher 密码 ciphertext 密文 CAlass A domain A类域 CAlass B domain B类域 CAlass C domain C类域 classless addressing 无类地址分配 cleartext 明文 CSNW Netware客户服务 client 客户,客户机 client/server 客户机/服务器 code 代码 COM port COM口(通信端口) CIX 服务提供者 computer name 计算机名

网络安全外文翻译--APR欺骗检测:一种主动技术手段

外文翻译原文及译文 学院计算机学院 专业计算机科学与技术班级 学号 姓名 指导教师 负责教师 2011年6月

Detecting ARP Spoofing: An Active Technique Vivek Ramachandran and Sukumar Nandi Cisco Systems, Inc., Bangalore India Indian Institute of Technology, Guwahati, Assam, India Abstract. The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofing is sometimes the starting point for more sophisticated LAN attacks like denial of service, man in the middle and session hijacking. The current methods of detection use a passive approach, monitoring the ARP traffic and looking for inconsistencies in the Ethernet to IP address mapping. The main drawback of the passive approach is the time lag between learning and detecting spoofing. This sometimes leads to the attack being discovered long after it has been orchestrated. In this paper, we present an active technique to detect ARP spoofing. We inject ARP request and TCP SYN packets into the network to probe for inconsistencies. This technique is faster, intelligent, scalable and more reliable in detecting attacks than the passive methods. It can also additionally detect the real mapping of MAC to IP addresses to a fair degree of accuracy in the event of an actual attack. 1. Introduction The ARP protocol is one of the most basic but essential protocols for LAN communication. The ARP protocol is used to resolve the MAC address of a host given its IP address. This is done by sending an ARP request packet (broadcasted) on the network. The concerned host now replies back with its MAC address in an ARP reply packet (unicast). In some situations a host might broadcast its own MAC address in a special Gratuitous ARP packet. All hosts maintain an ARP cache where all address mappings

浅析网络安全的技术-毕业设计(论文)外文翻译 (2)

附件1 外文资料翻译译文: 浅析网络安全的技术 过去两个世纪中,工业技术代表了一个国家的军事实力和经济实力。飞速发展的今天,对信息技术的掌握是在二十一世纪增强综合国力的关键。 随着计算机技术的发展,在计算机上处理业务已由基于单机的数学运算、文件处理,基于简单连结的内部网络的内部业务处理、办公自动化等发展到基于企业复杂的内部网、企业外部网?、全球互联网的企业级计算机处理系统和世界范围内的信息共享和业务处理。在信息处理能力提高的同时,系统的连结能力也在不断的提高。但在连结信息能力、流通能力提高的同时,基于网络连接的安全问题也日益突出。本文主要从以下几个方面进行探讨: 一、网络在开放的同时存在的安全问题 Internet的开放性以及其他方面因素导致了网络环境下的计算机系统存在很多安全问题。为了解决这些安全问题,各种安全机制、策略和工具被研究和应用。然而,即使在使用了现有的安全工具和机制的情况下,网络的安全仍然存在很大隐患,这些安全隐患主要可以归结为以下几点: 1)安全机制的局限 每一种安全机制都有一定的应用范围和应用环境。防火墙是一种有效的安全工具,它可以隐蔽内部网络结构,限制外部网络到内部网络的访问。但是对于内部网络之间的访问,防火墙往往是无能为力的。因此,对于内部网络到内部网络之间的入侵行为和内外勾结的入侵行为,防火墙是很难发觉和防范的。 2)安全管理机制的建立 常用的安全管理机制有:口令管理;各种密钥的生成、分发与管理;全网统一的管理员身份鉴别与授权;建立全系统的安全评估体系;建立安全审计制度;建立系统及数据的备份制度;建立安全事件/安全报警反应机制和处理预案;建立专门的安全问题小组和快速响应体系的运作等。 为了增强系统的防灾救灾能力,还应制定灾难性事故的应急计划,如紧急行动方案,资源(硬件,软件,数据等)备份及操作计划,系统恢复和检测方法等。 3)安全工具的影响

计算机网络安全与防范外文翻译文献

计算机网络安全与防范外文翻译文献(文档含中英文对照即英文原文和中文翻译) 翻译: 计算机网络安全与防范 1.1引言 计算机技术的飞速发展提供了一定的技术保障,这意味着计算机应用已经渗透到社会的各个领域。在同一时间,巨大的进步和网络技术的普及,社会带来了巨大的经济利润。然而,在破坏和攻击计算机信息系统的方法已经改变了很多的网络环境下,网络安全问题逐渐成为计算机安全的主流。

1.2网络安全 1.2.1计算机网络安全的概念和特点 计算机网络的安全性被认为是一个综合性的课题,由不同的人,包括计算机科学、网络技术、通讯技术、信息安全技术、应用数学、信息理论组成。作为一个系统性的概念,网络的安全性由物理安全、软件安全、信息安全和流通安全组成。从本质上讲,网络安全是指互联网信息安全。一般来说,安全性、集成性、可用性、可控性是关系到网络信息的相关理论和技术,属于计算机网络安全的研究领域。相反,狭隘“网络信息安全”是指网络安全,这是指保护信息秘密和集成,使用窃听、伪装、欺骗和篡夺系统的安全性漏洞等手段,避免非法活动的相关信息的安全性。总之,我们可以保护用户利益和验证用户的隐私。 计算机网络安全有保密性、完整性、真实性、可靠性、可用性、非抵赖性和可控性的特点。 隐私是指网络信息不会被泄露给非授权用户、实体或程序,但是授权的用户除外,例如,电子邮件仅仅是由收件人打开,其他任何人都不允许私自这样做。隐私通过网络信息传输时,需要得到安全保证。积极的解决方案可能会加密管理信息。虽然可以拦截,但它只是没有任何重要意义的乱码。 完整性是指网络信息可以保持不被修改、破坏,并在存储和传输过程中丢失。诚信保证网络的真实性,这意味着如果信息是由第三方或未经授权的人检查,内容仍然是真实的和没有被改变的。因此保持完整性是信息安全的基本要求。 可靠性信息的真实性主要是确认信息所有者和发件人的身份。 可靠性表明该系统能够在规定的时间和条件下完成相关的功能。这是所有的网络信息系统的建立和运作的基本目标。 可用性表明网络信息可被授权实体访问,并根据自己的需求使用。 不可抵赖性要求所有参加者不能否认或推翻成品的操作和在信息传输过程中的承诺。

英文数据库

英文数据库 A ABI/INFORM Complete ProQuest 公司出版,是欧美大学普遍使用的著名商业及经济管理期刊论文全文数据库。 Access World News世界各国报纸全文库,全球最大与增长最快的报纸数据库,具浏览报纸功能,时效性强,每天更新,可以看到当日大部分报纸,内容十分广泛。 ACM Digital Library收录了美国计算机协会(Association for Computing Machinery)的各种电子期刊、会议录、快报等文献 AGRICOLA农业参考文献数据库,涉及美国农业和生命科学等领域,提供了1970年至今的重要农业信息。 AIAA美国航空航天学会会议论文及期刊全文数据库,世界第一的航空航天和宇宙科学文献来源。 American Chemical Socitey美国化学学会全文期刊数据库 American Mathematics Society美国数学学会数据库,世界上最权威的数学学术团体,数据库内容涉及数学及数学在统计学、工程学、物理学、经济学、生物学、运筹学、计算机科学中的应用等 American Physical Society (APS) 美国物理学会数据库,为用户提供期刊的在线阅读。Annual Reviews为全世界的科学团体服务,提供由著名科学家撰写的评论。Annual Reviews 分生物医学、物理学和社会科学三个主题,共出版29种期刊。 ASCE The American Society of Civil Engineers美国土木工程师协会数据库 ASME Technical Journal美国机械工程师学会数据库。美国机械工程师学会,主持着世界上最大的技术出版之一,制定各种工业和制造业行业标准。由于工程领域各学科间交叉性不断增长,ASME出版物也相应提供了跨学科前沿科技的资讯。 B Beilstein/Gmelin crossfire以电子方式提供包含可供检索的化学结构和化学反应、相关的化学和物理性质,以及详细的药理学和生态学数据在内的最全面的信息资源。 BIOSIS Previews世界上最大的关于生命科学的文摘索引数据库。 Blackwell全球最大的学协会出版商,与世界上550多个学术和专业学会合作,出版国际性期刊700余种,在科学技术、医学、社会科学以及人文科学等学科领域享有盛誉。Bowker多年来在提供图书、期刊和出版信息相关之参考工具资源上,一直扮演着领导者的角色,提供:https://www.360docs.net/doc/4b11716237.html, with Reviews(在版书目),https://www.360docs.net/doc/4b11716237.html,(乌利希国际期刊指南)及期刊分析系统等数据库。 BVD全球财金领域内知名的专业信息提供商,为各国政府研究机构、金融与商业组织、证券投资公司、大型图书馆、财经类大学提供国际财经、金融、各国宏观经济走势分析、跨国企业信用评级、各国并购交易等最新信息,并配以高级、易用的数据分析软件,供用户快速提取各类所需数据,并可开展各项统计、国际同业对比等分析研究工作,以支持金融投资、财务、管理等学科的研究与教学。 C CAB Abstracts覆盖了农业科学的各个领域,包括农艺、生物技术、植物保护、乳业科学、经济、森林、遗传、微生物、寄生虫学、乡村发展、兽医等专题。 Cambridge Scientific Abstracts剑桥科学文摘(CSA)包括60多个数据库,覆盖的学科范围包括:生命科学、水科学与海洋学、环境科学、计算机科学、材料科学以及社会科学。Cambridge University Press剑桥大学出版的全文电子期刊数据库,涉及数学、物理学、哲学、经济学、生物医学、心理学、语言学等十几个学科140种电子期刊

网络安全与防火墙 英文文献翻译

Research of Network Security and Firewalls Techniques Abstract: As the key facility that maintains the network security , firewalls take the purpose of establishing an obstacle between trust and trustless network, and put corresponding safety strategy into practice. In this paper , the computer network security and the techniques of firewalls were mainly discussed, the concept and classification of the firewalls were introduced. It also introduced three kind's of basic implement techniques of the firewalls: Packet filtering , Application Proxy and Monitor model in detail. Finally described the trend of development of the firewalls techniques in Internet briefly. Key words: network security, firewalls, Packet filtering, monitor 1. Introduction Now with the computer network and e-commerce used widely, network security has become an important problem that we must consider and resolve. More and more professions. enterprises and individuals surfer from the security problem in different degree. they are looking for the more reliable safety solution . In the defense system adopted by network security at present, the firewalls stand the very important position. As the key facility that maintains the network security. firewalls take the purpose of establishing an obstacle between trust and trustless network, and put corresponding safety strategy into practice. All the firewalls have the function to filter the IP address. This task checks the IP packet, makes the decision whether to release or to abandon it according to the source address and destination address of the IP. Shown in Fig.I, there is a firewall between two network sections, an UNIX computer is on one side of the firewall, and the other side is a PC client. While the PC client asks a telnet request for the UNIX computer, the client procedure of telnet in the PC produces a TCP packet and passes the packet to the local protocol stack to prepare to send. The protocol stack fills it in one IP packet. then, sends it to UNIX computer through the path defined by the TCP/IP stack of PC. The IP packet can't reach the UNIX computer until it passes the firewall between the PC and the UNIX computer. Fig. I Ip Address Filtering The application firewall is a very efficient means of network security on Internet,it is installed between the trust and trustless network, can isolate the connection between the trust and trustless network, and doesn't hamper people's access to the trustless network at the same time. It can isolate the connection between the risk area (namely there may be a certain risk on Internet) and the safe area (LAN), and doesn't hamper people's access to the risk area at the same time. Firewall can monitor the traffic flowing in and out from the network to finish the task seemingly impossible;it only allows the safe and checked information to enter into, and meanwhile resists on the data that may bring about the threat to enterprise. As the fault and defect of the security problem become

数据库外文文献翻译

Transact-SQL Cookbook 第一章数据透视表 1.1使用数据透视表 1.1.1 问题 支持一个元素序列往往需要解决各种问题。例如,给定一个日期范围,你可能希望产生一行在每个日期的范围。或者,您可能希望将一系列的返回值在单独的行成一系列单独的列值相同的行。实现这种功能,你可以使用一个永久表中存储一系列的顺序号码。这种表是称为一个数据透视表。 许多食谱书中使用数据透视表,然后,在所有情况下,表的名称是。这个食谱告诉你如何创建表。 1.1.2 解决方案 首先,创建数据透视表。下一步,创建一个表名为富,将帮助你在透视表:CREATE TABLE Pivot ( i INT, PRIMARY KEY(i) ) CREATE TABLE Foo( i CHAR(1) ) 富表是一个简单的支持表,你应插入以下10行: INSERT INTO Foo VALUES('0')

INSERT INTO Foo VALUES('1') INSERT INTO Foo VALUES('2') INSERT INTO Foo VALUES('3') INSERT INTO Foo VALUES('4') INSERT INTO Foo VALUES('5') INSERT INTO Foo VALUES('6') INSERT INTO Foo VALUES('7') INSERT INTO Foo VALUES('8') INSERT INTO Foo VALUES('9') 利用10行在富表,你可以很容易地填充枢轴表1000行。得到1000行10行,加入富本身三倍,创建一个笛卡尔积: INSERT INTO Pivot SELECT f1.i+f2.i+f3.i FROM Foo f1, Foo F2, Foo f3 如果你名单上的行数据透视表,你会看到它所需的数目的元素,他们将编号从0到999。 1.1.3讨论 你会看到食谱,跟随在这本书中,枢轴表通常是用来添加一个排序属性查询。某种形式的数据透视表中发现许多数据库为基础的系统,尽管它往往是隐藏的用户,主要用在预定义的查询和程序。 你已经看到一些表连接(的富表)控制的行数,我们插入语句生成的数据透视表。从0到999的值是通过连接生成的字符串。数字值,是字符串。因此,当加号(+)运算符用来串连,我们得到的结果如下: '0' + '0' + '0' = '000' '0' + '0' + '1' = '001 这些结果是插入整数列在目的地的数据透视表。当你使用一个插入语句插入字符串到整数列的数据库,含蓄地转换成整数的字符串。笛卡尔积富情况下确保

电子商务信息安全中英文对照外文翻译文献

电子商务信息安全中英文对照外文翻译文献(文档含英文原文和中文翻译)

原文: E-commerce Information Security Problems Ⅰ. Introduction E-commerce (E-Business) is in open networks, including between enterprises (B2B), business and consumers (B2C) commercial transactions, compared with the traditional business model, e-commerce with efficient, convenient, covered wide range of characteristics and benefits. However, e-commerce open this Internet-based data exchange is great its security vulnerabilities, security is a core e-commerce development constraints and key issues. In this paper, the basic ideas and principles of systems engineering, analyzes the current security threats facing e-commerce, in this based on security technology from the perspective of development trend of e-commerce. Ⅱ. E-commerce model Modern e-commerce technology has focused on the establishment and operation of the network of stores. Network in the department stores and real stores no distinction between structure and function, differences in their function and structure to achieve these methods and the way business operate. Web store from the front view is a special kind of WEB server. WEB site of modern multimedia support and a good interactive feature as the basis for the establishment of this virtual store, so customers can, as in a real supermarket pushing a shopping cart to select goods, and finally in the checkout check out. These online stores also constitute the three pillars of software: catalog, shopping cart and customer checkout. Customers use an electronic currency and transaction must store customers and stores are safe and reliable. Behind the store in the network, enterprises must first have a product storage warehouse and administration; second network to sell products by mail or other delivery channels to customers hands; Third, enterprises should also be responsible for product after-sales service, This service may be through networks, may not. Internet transactions are usually a first Pay the bill and getting goods shopping. For customers, convenience is that the goods purchased will be directly delivered to their home, but hard to feel assured that the goods can not be confirmed until the hands

相关文档
最新文档