Description: 基于TCP/IP协议的网络入侵检测系统是在Linux平台下,充分利用Linux的网络特性来设计的网络安全防御系统的一部分。在完全理解TCP/IP通讯协议的基础上来开发基于网络的入侵检测系统,它主要包括以下几个部分:数据包拦截器,数据包分析器,数据包生成器,远程通讯控制模块,集中管理模块等。 关键字:入侵检测系统,网络安全,协议分析,网络入侵检测系统- Based on the TCP/IP agreement network invasion examination
system is under the Linux platform, fully a network security defense
system part which designs using the Linux network characteristic.
Completely was understanding the TCP/IP communication agreement the
foundation comes up the development based on the network invasion
examination system, it mainly includes following several parts: Data
packet interceptor, data packet analyzer, data packet production,
long-distance communication control module, centralized management
module and so on. Essential character: Invasion examination system,
network security, protocol analysis, network invasion examination
system Platform: |
Size: 72309 |
Author:吴玲 |
Hits:
Description: 本教程是面向对网络安全感兴趣的菜鸟们的,只要对网络安全感兴趣,无须计算机基础,就能轻松上手,赶快看看吧!也希望籍此结交高手,交流心得,扩大我们计算机从业人员队伍。-this tutorial is geared to network security Caidaomen interest, as long as network security interest, not computer based, it was easy to get started soon and see! Also hope to use the occasion to make a master, to share experiences, expand our ranks of computer professionals. Platform: |
Size: 752470 |
Author:谢玉雄 |
Hits:
Description: 本安全评估系统通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测,去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。-assessment of the security system of network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack. Platform: |
Size: 165763 |
Author:石林 |
Hits:
Description: 西安黑客联盟主站程序,后台:admin admin888 黑色界面!内有大量的网络安全文章-Xi'an main stations, background : admin interface admin888 black! With a large number of network security article Platform: |
Size: 2694827 |
Author:扬宏 |
Hits:
Description: 用于扫描你的电脑上所有的TCP端口的状态。利用这个功能,你可以轻松、快速的查出你的电脑上所使用的TCP端口,进而判断你的电脑是否中了木马。扫描出来的端口状态有两种:拒绝连接、接受连接。对于处于拒绝连接状态的端口,很可能是你的电脑为了与外部主机连接而使用的,通常情况下不会对你的网络安全构成威胁。而处于接受连接状态的端口,可能会对你的网络安全构成威胁,甚至很有可能是木马程序在运行!假若你想通过本端口扫描来判断你的电脑是否中了木马,在扫描时请不要运行其它网络程序,如果扫描结果还是有处于接受连接状态的端口,那请小心警惕!最好找个电脑高手来帮忙! 注意:对于137,138,139这三个TCP端口,即使这里的扫描没有给出扫描结果,也并不代表这三个端口不接受连接,通常情况下,Windows系统会开放这三个端口。你可以用“聊天客户”来测试这三个端口是否开放,具体用法如下:翻到“聊天客户”页,选择“主机列表”里的“本地主机”,将端口改为137(或138或139),单击“连接”,若出现提示“建立连接”,则端口137(或138或139)是开放的。-used to scan your computer on all the TCP port state. Using this feature, you can easily and quickly identify your computer by the use of TCP port, then your judgment on whether a computer Trojan horse. Scanning the state has two ports : connecting refused to accept connections. For refused to connect at the state port, it is very likely your computer to connect with the mainframe and external use, under normal circumstances you will not pose a threat to network security.!accept the connection status of ports, care alert! finding the best computer experts to help! Note : This three TCP 137, 138 and 139 ports, even if the scanning here is not the results of the scan, it does not mean that this does not accept three port connectivity Platform: |
Size: 369674 |
Author:李利 |
Hits:
Description: 这是一个基于java,snmp的网络安全日志审计系统,提供方便的用户交互界面,以及实用的日志分析功能-This is a java-based, snmp network security audit log system to provide easy user interface, as well as the practical function of the log analysis Platform: |
Size: 1312037 |
Author:高岩宇 |
Hits:
Description: 该项目通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技
术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测,
去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同
时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安
全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。 -the project through the network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack. Platform: |
Size: 1170077 |
Author:大大 |
Hits:
Description: Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. cryptography is about constructing and analyzing protocols that prevent third parties or the public reading private messages various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography.-Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. cryptography is about constructing and analyzing protocols that prevent third parties or the public reading private messages various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography. Platform: |
Size: 10075136 |
Author:Nisha Pal |
Hits:
Description: This may be one of the most important books you
ever read. Cybersecurity is both a national and
economic security issue. Governments worldwide
wage clandestine battles every day in cyberspace.
Infrastructure critical to our safety and well-being, Platform: |
Size: 13274112 |
Author:20e23ec1 |
Hits:
Description: Approach:
NS-2 is an open source system that is developed using C++ and Tool Control Language TCL. Researchers can freely add new components to the system to server their own purposes. The latest version of NS-2 is version 2.28. Within this version, most of the standard protocols supported. You can find protocol from media access layer protocols such as CSMA/CD up to application protocols as FTP and HTTP. For routing protocols, there are unicast and multicast routing protocols for wire network and DSR, DSDV, AODV for wireless ad-hoc networks. Most of these protocols were developed by researchers and adopted into standard version of NS-2.
In order to experiment security features for network, we need to add security functions into NS-2. Of course for specific experiments there are specific requirements. The purpose of this project is only to illustrate a way to add security functions into NS-2
Our approach is to build a new protocol at network layer Platform: |
Size: 2048 |
Author:bvc |
Hits: