3rd International Conference on Advances in Energy, Environment and Chemical Engineering | |
Research and realization implementation of monitor technology on illegal external link of classified computer | |
能源学;生态环境科学;化学工业 | |
Zhang, Hong^1 | |
University of Chinese Academy of Sciences, Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences, 610051, China^1 | |
关键词: Continuous development; External network; Monitoring technologies; Network security problems; Network technologies; Physical isolation; Two-way networks; Wireless Internet access; | |
Others : https://iopscience.iop.org/article/10.1088/1755-1315/69/1/012163/pdf DOI : 10.1088/1755-1315/69/1/012163 |
|
学科分类:环境科学(综合) | |
来源: IOP | |
【 摘 要 】
In recent years, with the continuous development and application of network technology, network security has gradually entered people's field of vision. The host computer network external network of violations is an important reason for the threat of network security. At present, most of the work units have a certain degree of attention to network security, has taken a lot of means and methods to prevent network security problems such as the physical isolation of the internal network, install the firewall at the exit. However, these measures and methods to improve network security are often not comply with the safety rules of human behavior damage. For example, the host to wireless Internet access and dual-network card to access the Internet, inadvertently formed a two-way network of external networks and computer connections [1]. As a result, it is possible to cause some important documents and confidentiality leak even in the the circumstances of user unaware completely. Secrecy Computer Violation Out-of-band monitoring technology can largely prevent the violation by monitoring the behavior of the offending connection. In this paper, we mainly research and discuss the technology of secret computer monitoring.
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
Research and realization implementation of monitor technology on illegal external link of classified computer | 542KB | download |