Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Ordnance Industry Automation》 2006-01
Add to Favorite Get Latest Update

Exploration on Exchange and Anti-Virus Technical Fusion

LUO Hong, BAO Lin-yu, LONG Chao (College of Computer, Southwest University of Science & Technology, Mianyang 621010, China)  
Take three switchboards as an example, the IEEE802.1x protocol was applied to do the blocking control for the exchange and the anti-virus technical fusion distributional management, and each switchboard contains the corresponding safety mechanism storehouse. When data was flowed to probe, associated information in data package was saved in DSM, and it was compared at same time. The port of information exchange/route was controlled to break or warn or prompt baneful mail according to the requirement of strategy-base. Saved information was analyzed through monitoring server to realize monitoring for running state of network.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 10 Hits
1 LIU Lin(School of Management, Hefei University of Technology, Hefei 230009, China);Design of Student Management Information System in Colleges[J];Journal of Anhui Tv University;2002-04
2 Chen Linyu (Zhangjiakou Power Supply Co. Zhangjiakou 075000);A Brief Analysis on Information Network Security Threats[J];Office Informatization;2009-02
3 CHENG Jun, SUN Hai-feng (College of Computer Science, Southwest University of Science & Technology, Mianyang 621010, China);Design of Honey Pot System Based on VMWare in Windows[J];Ordnance Industry Automation;2006-04
4 LIU Guishan,HU Juncheng(Department of Computer Science and Engineering, School of Information Science and Technology, Beijing Institute of Technology, Beijing100081, China);Design of Communication Stream for the 1553B Bus[J];Journal of Beijing Institute of Technology;2003-03
5 REN Yong-lin~1,QIN Mian~2,REN Wei-lin~3(1.Faculty of Computer Science, University of New Brunswick, New Brunswick Province E3B 5A3,Canada; 2.Beijing Control Industrial Computer Company of P. R. C. State Aerospace Bureau, Beijing 100080,China; 3.Beijing Institute of Control Engineering,Beijing 100080,China);SYSTEM DESIGN AND IMPLEMENTATION OF ELECTRONIC REVENUE AFFAIRS[J];Journal of Beijing Technology and Business University (Natural Science Edition);2005-01
6 LI Shi hong, LI Fang wei (Chongqiing University of Posts and Telecommunications, Chongqiing 400065,P.R.China);Security Improvement of the 3G Mobile Communication System[J];Journal of Chongqing University of Posts and Telecommunications;2002-04
7 YANG Zong-kai~1,HE Yan~(1,2),ZHANG Ao~2(1.Department of Electrons and Information,Huazhong University of Science and Technology,Hubei Wuhan 430074,P.R.China;2.Wuhan Research Institute of Posts and Telecommunications,Hubei Wuhan 430074,P.R.China);Study and implementation of EPON system secruity mechanism[J];Journal of Chongqing University of Posts and Telecommunications(Natural Science);2006-05
8 GAO Kai-peng,ZHOU WeiChina Netcom(Group)Co.Ltd,Changchun Branch,Changchun 130051,China;Secuity Problems and Countermeasures of the Network Systerm[J];Journal of Jilin University(Earth Science Edition);2008-S1
9 YU Xiu xia (Modern Education Technology Centre,Changchun University,Changchun?130022,China);Analysis of public-key encryption numeration[J];Journal of Changchun University;2002-01
10 ZHANG Yi (Information Technology Centre,Sanxia University,Yicang443002,China);On online security[J];Journal of Changchun University;2006-02
China Proceedings of conference Full-text Database 4 Hits
1 Mo Shiyu (WMCRI No.70005 box wuhan, China 430079);Network Antagonize & Communications Safety[A];[C];2008
2 ZHAO Lin SHANG Yu jin Bengbu tank institute,Bengbu 233050,China;The Application of 3G Mobile Technology in Armored Tactics Networks[A];[C];2008
3 Qu Weiping,Zhou Qingsong,Zhou Qiang,Jin Yingqin,Li Lei College of the Computer Science and Technology,Anhui University of Science and Technology,Huainan 232001;Enhancing Fundamental Education on Computer Viruses Control Technology and Relative Research[A];[C];2009
4 Zhao yu,Chi chang,Sun yan (Beijing Branch of China United Network Communications Croup Co.,Ltd,Beijing,China);The Character and Prevention of Internet Attack[A];[C];2010
Chinese Journal Full-text Database 10 Hits
1 Wei Guowang Lin Zhong(Huafei Institute, Beijing Univ. of Post & Telecom, Beijing 100876);Application of RADIUS Protocol in Accounting of Network Management[J];Telecom Engineering Techniques and Standardization;2004-09
2 HUANG Jialin, MENG Wei, HUANG Yanbo(Information Science and Engineering College, Central South University,Changsha 410083);Utilizing the Dynamic Configuration of MAC Address to Prevent IP Address from Embezzlement[J];Computer Engineering;2002-08
3 ZHU Hailong,ZHANG Guoqing (Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080);Ethernet Access Technology Based on 802.1X Protocol[J];Computer Engineering;2003-18
4 ZHANG Shukui (Computer Science & Technology College,Soochow University,Suzhou 215006);Research and Realization of Middleware-based Network Authentication Technology[J];Computer Engineering;2004-23
5 DONG Zhenliang1, LV Shuwang2, WANG Zhaoshun3 (1. School of Information Engineering, University of Science&Technology, Beijing 100083; 2. State Key Laboratory of Information Security of CAS, Beijing 100083; 3. School of information engineering, University of Science&Technology, Beijing 100083);Design of Authentication Model of Intranet Security Management System Management System Based on 802.1X[J];Computer Engineering;2007-12
6 PENG Wei (Computer Department,East China Normal University,Shanghai 200062, China);Campus Network Authentication by Using 802.1x[J];Computer Applications;2003-03
7 JIANG Haifeng1,MIAO Fang2 (1. College of information management, Chengdu University of Technology, Chengdu Sichuan 610059, China; 2. College of information engineering, Chengdu University of Technology, Chengdu Sichuan 610059, China);Research on the Extended Application of 802.1x Standard and RADIUS Protocol[J];Computer Applications;2003-11
8 LIU Yong peng,LU Ze xin (School of Computer Science,National University of Defense Technology,Changsha Hunan 410073,China);Limitation in Binding MAC and IP[J];Application Research of Computers;2002-09
9 WU Xin~(1,2),HUANG Hao~(1,2)(1.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing Jiangsu 210093,China;2.Dept.of Computer Science & Technology,Nanjing University,Nanjing Jiangsu 210093,China);Research on Active Network Defence Technology Based on Deception[J];Application Research of Computers;2006-11
10 Li Jun ( Computer and Network Center, Guandong Polytechnic Normal University, Guangzhou 510665);IMPLEMENTING AUTHENTICATION PROTOCOL IN ETHERNET[J];Computer Applications and Software;2003-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved