Broadcasting Bidirectional Access Network Intrusion Detection System Facing Tri-Networks Integration
Han Qiu1,Julong Lan2,Yangfeng Ou3,Chuanhao Zhang2,Yanhong Wang4
1 The Information Engineering University,Zhengzhou 450002,China 2 National Digital Switching System Engrneering & Technology R&D Center,Zhengzhou 450002,China 3 Academy of Broadcasting Science,SARFT,Beijing 100866,China 4 Dalian Tnet Network Technology Co.,Ltd.,Dalian 116023,China
Online:2015-07-23
Published:2015-08-03
Supported by:
The National High Technology Research and Development Program of China(863 Program);National Basic Research Program of China(973 Program)
王欣, 陈德林, 孙岳 等. 广电智能终端操作系统安全模型及技术实现. 自动化与仪器仪表, 2014(8):121~123 Wang X , Chen D L , Sun Y , et al. Radio intelligent terminal operating system security model and technology. Automation &Instrumentation, 2014(8):121~123
2
欧附峰, 朱里越, 牛妍华 等. 面向下一代广播电视网的安全保障技术机制研究. 网络新媒体技术, 2012,1(4):6~9 Ouyang F , Zhu L Y , Niu Y H , et al. Security management architecture research next generation broadcasting. Network New Media, 2012,1(4):6~9
3
Viehbock S . Brute forcing Wi-Fi protected setup. , 2011
4
Cutlip Z . SQL injection to MIPS overflows:rooting SOHO routers. Proceedings in Black Hat, Vegas,USA, 2012
巫英坚, 张恩附, 展华益 . 电视操作系统(TVOS)研发及产业化. 网络新媒体技术, 2012,1(1):1~3 Wu Y J , Zhang E Y , Zhan H Y . TV operating system(TVOS)R&D and industrialization. Journal of Network New Media, 2012,1(1):1~3
7
Security meets big data:RSA’s new security analytics system. Brute forcing Wi-Fi protected setup. , 2015
8
Cascarano N , Ciminiera L , Risso F . Optimizing deep packet inspection for high-speed traffic analysis. Journal of Network and Systems Management, 2011,19(1):7~31.
9
赵彬, 王亚弟, 李立新 等. 利用关联和风险评估方法减少误报和漏报. 计算机应用研究, 2008,25(10):3105~3107 Zhao B , Wang Y D , Li L X , et al. Reducing false positive and false negative by correlation and risk assessment. Application Research of Computers, 2008,25(10):3105~3107
10
张玲, 白中英, 罗守山 等. 基于粗糙集和人工免疫的集成入侵检测模型. 通信学报, 2013,34(9):166~176 Zhang L , Bai Z Y , Luo S S , et al. Integrated intrusion detection model based on rough set and artificial immune. Journal on Communications, 2013,34(9):166~176
11
Virvilis N , Gritzalis D . Trusted computing VS advanced persistent threats:can a defender win this game. Proceedings of the 10th IEEE International Conference on Autonomous and Trusted Computing, IEEE Press, Italy, 2013