安全审计

  • 网络Audit;security audit;security auditing;IOSA
安全审计安全审计
  1. 基于双空间审计迹的Linux安全审计技术

    Linux Security Audit Technology Based on Double Spaces Audit Trace

  2. Linux系统内核级安全审计方法研究

    Study on Kernel-level Security Audit Techniques of Linux System

  3. 网络行为安全审计系统Web应用的设计与实现

    Design and Realization of Web Application in Network Behavior Security Auditing System

  4. Agent的概念,Agent技术在安全审计系统中的应用。

    Concept of Agent , the application of Agent technology in safe audit system .

  5. LinuxShell安全审计机制的扩展

    An Extension to Security Auditing Mechanism of Linux Shell

  6. 一种增强的Linux系统安全审计机制

    An Enhanced Security Auditing Mechanism for Linux

  7. 基于Oracle的数据库安全审计技术研究

    Research on Security Auditing Technology of Database Based on Oracle

  8. 随后,本文引入了信息抽象级别(InformationAbstractionLevel)的概念,对检测过程中安全审计数据所经历的状态进行表述。

    After that , we introduce Information Abstraction Level to characterize the logic abstraction hierarchy of audit data in the process of Intrusion Detection .

  9. 网络审计与监控覆盖了OSI(OpenSystemInterconnection)提出的网络管理功能领域中的多个目标,包括性能审计、故障审计、账户审计和安全审计等。

    Network Auditing and Monitoring covers multiple targets of network management field which was defined by Open System Interconnection ( OSI ) .

  10. INFORMIX数据库安全审计的配置分析及应用

    Configuration , analysis and application of the secure-audit of INFORMIX database

  11. 将安全审计或其它安全软件封装成移动Agent,在需要时派遣至网络各节点中完成相应的安全任务,从而实现可定制的安全策略。

    The mobile agent encapsulated by security audit or other security packages are dispatched to the network nodes to implement corresponding security tasks , which customs the security policies .

  12. 使用Cache技术、数字水印技术与安全审计技术,提供了对整套系统的日志和事件审计日志的安全控制。

    In the system , there are many technology to improve security of system , such as cache , watermark and log audit technology .

  13. 基于APA平台的安全审计监控系统模型设计与实现

    Design and Implementation of Security Audit Monitor System Model Based on APA Platform

  14. CNPC网的安全审计系统的研究与实现

    Design and implementation of network security and audit system for CNPC Net

  15. 用宽带接入服务器(BAS)作为分布式审计代理实现城域网(MAN)上的主动式安全审计系统。

    A broadband access server ( BAS ) was used as auditing agent to implement a distributed security auditing system on metropolitan area network ( DSASMAN ) .

  16. DFL在网络安全审计中的应用研究

    The Application and Research on DFL in Network Security Auditing

  17. FreeBSD中内核级安全审计系统的构建

    Construction of kernel level secure auditing in FreeBSD

  18. 最后应用MATLAB仿真软件和安全审计数据集对利用学习矢量量化改进后的SOM的网络进行入侵检测仿真试验,并进行结果分析。

    Finally the application of MATLAB simulation software and security audit data sets on the learning vector quantization of improved SOM network intrusion detection simulation test and analysis of the results .

  19. 所谓信息过滤技术就是通过IP过滤,URL过滤、关键词过滤、图像过滤、模板过滤、智能过滤等手段,对互联网用户进行信息安全审计管理和访问控制的技术。

    The so-called information filtering technique is the censorship management and the technology of controlling internet visit through IP filtering , URL filtering , keyword filtering , image filtering , template filtering , intelligence filter etc.

  20. 文章在分析了现行Linux安全审计系统所存在问题的基础上,提出了一个基于LKM技术的Linux系统内核级安全审计模型。

    In this paper , The authors first analyze the disadvantages of current Linux audit system , then propose a kernel-level security audit model of Linux system based on LKM technique .

  21. 介绍了基于案例推理(CaseBasedReasoning)技术及其应用特点,将CBR技术应用到安全审计系统中,提出了一种以CBR为基础的安全审计系统的功能模型,分析了系统的关键技术。

    This paper introduces the Case_Based Reasoning technique and it 's application characteristics , applies CBR to security auditing system , presents a function model of security auditing system based on CBR , analyzes the key technique of this system .

  22. 利用可装入内核模块和系统调用劫持技术实现了对LinuxShell安全审计机制的扩展,并给出了用其进行安全监测的例子。

    With Linux loadable kernel module technique and system call interception , an extension to security auditing mechanism of Linux shell is implemented in this paper , and then some examples are given for security monitoring with the new mechanism .

  23. Nmap是一个用于网络检测或安全审计的免费开源工具。

    Nmap is a free , open source utility for network exploration or security auditing .

  24. 综合分析流动人口管理体系需求,在满足现有需求的基础上,拟将对称加密、VPN、访问控制、安全审计等技术引入流动人口信息管理建设。

    Demand management system for the floating population comprehensive analysis , based on satisfying the current requirements , the symmetric encryption , VPN , access control , security audit technology into the floating population management information construction .

  25. 并以Windows2003操作系统和Oracle数据库为平台,对该系统的管理员管理、机构管理、用户管理、角色组管理、系统配置管理和安全审计测试等6项功能进行了测试。

    Base on the Windows 2003 and Oracle system , six aspects of this system have been tested , which include administrator management , agency management , user management , group of roles management , system configuration and security auditing .

  26. 在系统中通过改进syslog机制,引入有学习能力的数据挖掘技术,实现对无线网关的安全审计。

    The system completes the security auditing of wireless gateway by improving the syslog mechanism and introducing the data mining technology , which possesses the learning ability .

  27. 该安全审计系统与安胜安全操作系统V2.0的审计系统相比,性能得到了很大的提高。

    Compared with the secure auditing system of ANSHENG secure operating system V2.0 , the LSM based auditing system has a better performance .

  28. 在对当前各种主流的过滤技术进行了分析比较之后,通过在WINDOWSnt环境下的实验,介绍了该过滤驱动程序的工作流程和开发细节,分析了其在Web服务网络安全审计中的优良性能。

    Compared with the filtering technologies of current mainstream , this paper describes the workflow and development details of this filtering driver program under the environment experiment of the Windows NT platform , and emphasizes its excellent performance in the network security audit of the Web Service . 5 .

  29. 集成级测试的对象是文件、进程、网络、IPC等子系统,并且各子系统的测试组件在运行过程中提供验证记录,以完成对安全审计机制的测试。

    The objects of the subsystem class test are each subsystem in os , such as file 、 process 、 network 、 IPC . Each test upon the subsystem will provide validating records to check audit records of os .

  30. 本论文的创新点和特色主要有这些:采用了先进的IPsec技术作为安全审计系统的核心,避免了现行的几种审计系统模型的不足,能做到审计数据的真实性和合法性。

    The innovation of this thesis or main characteristics of these : the IPsec uses advanced technology as the core of the security audit system to avoid several of the current audit system the model is really the authenticity and legitimacy of the audit data .