共查询到19条相似文献,搜索用时 250 毫秒
1.
基于网络的安全漏洞探测技术 总被引:5,自引:0,他引:5
漏洞探测工具的目的是探测特定主机或网络中存在的安全漏洞,以测试系统的防御能力,给出可能的修补方法。漏洞探测包括面向主机的漏洞探测和面向网络的漏洞探测。首先从分析漏洞探测技术入手,重点分析了基于网络漏洞探测的原理和技术,在此基础上,介绍了一个基于网络安全的漏洞探测系统。 相似文献
2.
介绍了目前IP网络的视频会议体系架构,分析了视频会议针对QoS的要求,探讨了基于视频会议的QoS保障机制,在此基础上给出一种综合的QoS控制方案,即在视频会议终端内部实施基于应用的QoS技术,在IP网络中实施基于网络的QoS技术.重点对基于网络的Qos服务模型、数据层和控制层的具体实现过程以及基于应用的QoS的实现过程和实现技术进行了详细的探讨. 相似文献
3.
4.
5.
6.
作为美国追求全球网络霸权的一个重要组成部分,近些年,美军不断加强网络建设,开展网络制权的研究与实践,将制网权同制海权、制空权、制天权等一起看作是信息化战争取胜的关键,在全球率先组建网络战司令部,整合网络战资源,研究网络攻击模式,并不断深化“网络威慑”体系,以不断提升美军的网络战制胜能力。 相似文献
7.
8.
各种网络攻击事件正频繁发生,如何阻止来自网络外部和网络内部的攻击,显得越来越重要。文中首先分析了现有的网络信息安全系统存在的不足,然后应用智能代理技术,提出一种分布式网络监控系统结构,并进行了形式化分析和实现。由于该网络监控系统克服了现有网络信息安全系统的一些不足,因而具有广泛的应用前景。 相似文献
9.
近年来,网络攻击事件不断增多,西方国家纷纷组建其网电部队,网络军备掀起热潮,并成为主权利益博弈的新工具。网络军备与国家主权之间存在对立统一的关系,网络军备的发展对传统主权理论造成冲击,加剧主权事实上的不平等,主权内容更新。文章认为,我国应当积极推进国际网络军控进程和参与国际规则的制定、完善国内信息法律体系、发展网络外交和加强网络安全建设,从而维护我国主权利益。 相似文献
10.
11.
分布式拒绝服务攻击通过控制多台傀儡机对目标机进行攻击,该类型攻击的攻击路径隐蔽,对攻击者跟踪困难.在分析该类型攻击的特点,通过形式化的描述,分析该类型网络入侵规律,通过聚类分析技术描述出分布式拒绝服务攻击的攻击路径,定位网络入侵的实施者,有效地打击网络入侵行为. 相似文献
12.
Wilhelm Agrell 《战略研究杂志》2013,36(4):633-651
Throughout the Cold War Sweden pursued a declared policy of non-alignment. Sweden nevertheless established security links with a number of Western powers, first of all Britain and the US. The most extensive links were developed in two areas – military technology and intelligence. Intelligence liaison was of crucial importance for the security of non-aligned Sweden, but also significant for the major Western powers in filling gaps in intelligence collection. But intelligence liaison also served as an instrument in a closed policy arena where Sweden could receive or pay back favours, according to a pattern established already during World War II. However, intelligence liaison contained policy dilemmas, some of a more general nature, some specific for a country with an overt policy of non-alignment. 相似文献
13.
Risks are omnipresent in contemporary international security. Despite a long tradition in security studies going at least back to Von Clausewitz, we consider that the topic of risk remains under-examined. This forum seeks to advance the research agenda on risk in security studies by showcasing work of scholars using advanced concepts of risk, based on insights from sociology, biology, psychology, and safety studies, to better understand the role of risk in international security. As a way of introduction, this short article sets out the main debates. 相似文献
14.
15.
随着信息技术安全问题的日益突出,对网络系统进行安全分析日益重要.提出了一种基于图论的网络安全分析方法NEG-NSAM,在进行网络参数抽象和脆弱性关联分析的基础上,构造网络渗透图模型,刻画了威胁主体逐步渗透安全目标的动态过程.针对大规模网络环境,提出了渗透图简化算法.最后,运用NEG-NSAM方法进行了实例分析,验证该方法的可行性和有效性. 相似文献
16.
高速流场中的激波会产生明显的气动光学效应,导致光线发生偏移、聚焦等。从理论上考察了在不同入射角条件下,光线经过激波后发生角偏移量与激波强度的关系;针对通过计算流体力学得到的激波流场,提出了追迹步长根据当地折射率梯度和网格几何尺寸自适应调节的光线追迹的思想和方法,以提高追迹的精度;对所建立光线追迹方法的精度进行了考察。结果表明,所建立的光线追迹方法适用于激波流场的光线追迹,具有较高的精度。 相似文献
17.
W. Alejandro Sanchez 《Small Wars & Insurgencies》2013,24(3):185-198
Peru has battled two major insurgent movements since 1980. Around 25,000 Peruvians have died in this war between the government against the Shining Path and the MRTA. The Peruvian military has been incapable of achieving total victory after several major operations and the capture of just about every major rebel leader. Even worse, after a few years of almost no activity, Shining Path seems to be re-emerging. The last remaining members of this insurgent group have made alliances with foreign terrorist groups, used drug traffic to fund their fight and sweet talked people who are very disappointed and mad at the current Toledo administration, to gain more supporters. Major changes have to occur to prevent both groups from becoming threats to national security and society as a whole, taking the country back to times when around half of the nation was declared to be under terrorist control. The defense budget must be increased to open new bases, buy new equipment and train soldiers better to fight the insurgents more effectively. At the same time, major social changes need to occur; Toledo and his government must gain the trust and sympathy of Peruvians again by working for and with them. 相似文献
18.
IPSec是目前适合所有Internet通信的惟一一种安全技术。通过分析IPSec的处理过程,指出网络安全处理器的使用是IPSec协议高效实现的关键,并详细介绍了目前典型安全处理器的结构和应用。由于目前的网络安全处理器无法满足OC 48及其以上速率接口的处理要求,对下一代高速网络安全处理器的体系结构进行了分析和预测。 相似文献