用户名: 密码: 验证码:
公共网络信息系统安全管理的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着信息社会的发展,人类的生存方式、生活方式和行为方式正发生着巨大的变化。公共网络信息系统作为信息社会的基础性设施,已发展应用到国民经济的各个领域和社会生活的各个方面,成为国家事务、经济建设等重要领域和人们日常生活必不可少的组成部分,深深地影响并改善着人们的生活。但是,公共网络信息系统本身所固有的脆弱性使得信息系统安全问题无处不有、无时不在,人们的生产生活秩序也随之受到影响或破坏,信息系统安全问题也因此成为信息社会所面临的重要威胁。好在多数公共网络信息系统安全问题是可以通过科学的安全管理来避免的,因此,有必要深入研究信息系统安全管理问题以保证信息系统安全运行,从而保证社会活动的正常有序。
     本文围绕公共网络信息系统安全问题,针对信息系统安全所面临的威胁,依据相关标准和法律法规,从主动预防、积极应对、巡查防控和法律控制等几个方面来研究公共网络信息系统安全管理问题。主动预防是通过信息系统安全等级保护来落实各项安全措施,通过研究信息系统安全等级保护的定级和测评来优化资源配置和全面提升系统防护能力。但是,实施了安全等级保护的信息系统难免也会发生信息安全事件,需要采取措施积极应对。通过对信息安全事件的监测和响应,结合应急预案和应急联动体系,力争及早发现和及时处置信息安全事件,将信息安全事件造成的损失降到最小。由于技术或管理的原因,一些违法信息会躲过安全事件监测设备的监管而出现在公共网络上。通过对信息内容安全巡查系统的研究来提高巡查效率,及时发现网上违法信息并进行合理的处置,防止和控制这些信息在公共网络上的扩散和传播。以上对信息系统实行安全等级保护、对信息安全事件的监测响应以及对网上违法信息的巡查防控等安全管理措施都需要依据有关法律法规的规定,同时,法律控制还是遏制和打击网络犯罪最强有力的手段。通过对现有法律体系的研究为制定实施信息系统安全管理措施寻求更好的法律依据,对网络违法犯罪活动进行更有效防范和更严厉打击,从而进一步提高信息系统安全保障能力。
     本文的主要研究工作及创新点有:
     (1)信息系统安全等级保护是主动防御信息系统安全威胁一种措施。等级测评是信息系统安全等级保护工作的一个基本组成部分,测评结果的评价关系到评判信息系统能否满足相应安全保护等级的要求。基于测评结果与信息系统安全等级保护要求之间的关系是灰色的,提出对信息系统安全等级保护工作的测评结果以灰关联方法进行量化分析,设计了一种信息安全等级测评结果的综合评价体系,用于对测评结果的理解和使用。
     (2)公共网络信息安全事件是难以避免的,需要从整体上统一进行监测和管理,组织协调有关信息安全单位或个人参与应对信息安全事件,做到主动监测、努力规避和积极控制。为此研究了信息安全事件监测和响应系统,提出了层次化多元素融合入侵检测算法、网关级有害信息过滤报警系统、安全事件监测与应急响应平台。给出了应急预案的制定原则和编制模式,确定了应急联动体系应具备的功能和工作机制,将信息安全事件监测响应平台与信息安全事件应急预案和应急联动体系相结合共同应对公共网络信息安全事件。
     (3)为提高网上搜索巡查效果,研究提出了信息内容安全巡查系统,巡查范围可限且巡查周期可控,为公共网络上指定网站的信息内容安全提供了一种监督检查手段。提出的基于正则表达式分层处理的启发式算法提高了抽取网页主要文本信息的速度。对搜索巡查结果提出了具体的处理措施。
     (4)研究了法律法规在保障信息系统安全管理上的作用,根据网络犯罪的特点及其与计算机犯罪的不同之处,提出网络犯罪是现实和“虚拟”两个社会中的计算机犯罪的概念,将原有的计算机犯罪纳入到网络犯罪的范畴。针对现有法律法规在信息系统安全保障和网络犯罪控制问题上的不足,提出了完善现有法律的建议,以便更好地发挥法律法规在保障公共网络信息系统安全上的重要作用。
With the development of Information Society, human's living way, living style and living behavior are being changed gigantically. The public network information system as the infrastructure of Information Society has been developed and applied to various branches of national economy and all aspects of social life, becoming indispensable parts of important areas such as state affairs, economic construction etc and people's daily life, affecting and improving human life greatly. But the information system security problems that affect and damage the people's normal life are ubiquitous anytime at anywhere due to the inherent vulnerability of information system. The security problem of information system is the major threats or risks faced by the Information Society. Fortunately, many security problems of public network information system can be avoided by scientific security management, therefore, management measures must be researched thoroughly to secure the safety operation of information system and then assure the normal order of social activities accordingly.
     This dissertation deals with security problem of public network information system. Aimed at the threat faced by information system security and accorded to the relevant standards, laws and regulations, following aspects such as initiative protection, active responding, website monitoring and controlling, legal control are proposed. Initiative protection carries out security measures through information system rank protection, optimizes the allocation of resources and improves protection capability by researching the grading and testing of information system rank protection. However, the information security incident is unavoidable even in the information system protected by ranked protection and measures must be taken for active response. Active response is try to find and tackle information security incident in order to minimize the losses by monitoring and responding the information security incident combined with the formulation of contingency plan and joint action system. Because the technique and management problem, detrimental information may leak out onto the public network by breaking through the monitoring facilities of security incident. By researching the information content monitoring system to increase monitoring efficiency, detrimental information can be found quickly and tackled legitimately to stop the proliferation and prevalence. All above measures must under the control of laws and regulations and law is the strongest means to suppress and crack down on cyber crime. Present legal system is researched to seek for better support of laws on formulation and implementation of security management measures of information system and to keep watching cyber crime more efficient or crack down on cyber crime more severely in order to enhance the guarantee capability of information system security.
     Attention and innovativeness of this dissertation are concentrated on:
     (1) Information system rank protection is a kind of measurement to protect information system actively against security threat. Rank testing is a fundamental part of information system rank protection and the evaluating of testing results is related to judge whether the information system meet the requirements of relevant rank protection. Base on the correlation between the testing results and the requirements of information system security rank protection, a synthetic evaluation system is introduced by analyzing the quantitative results of multi-hierarchical gray correlation for the understanding and applying of the testing results.
     (2) The public network information security incident is inevitable and needs to be monitored and managed integrally. Relevant security organization, department or individual person are cooperated and coordinated to attend the disposal of information security incident for the purpose of initiative monitoring, struggling avoiding and active controlling. Based on the research of information incident monitor and emergency response system, a hierarchical multi-element fusion invasion detecting algorithm, a detrimental information filtering and alarming system on gateway level and a information security incident monitor and emergency response platform are proposed. The formulating principle and model of contingency plan and the functions and mechanisms of joint action system are introduced. The information security incident monitor and emergency response system is combined with the contingency plan and joint action system to tackle the public network information security incident together.
     (3) To heighten the effect of website inspecting, an information content safety monitoring system with limited searching scope and controlled cycle is introduced as a tool to inspect and supervise the information content of designated website on the public network. A proposed algorithm of parsing web division respectively based on regular expression raises the speed of extracting main text information from web pages. Concrete methods dealing with search results are introduced.
     (4) The function of laws and regulations to guarantee the information system security is studied. Considering the differences between cyber crime and computer crime, the concept that cyber crime is computer crime both in real society and virtual society is introduced and the computer crime is included by cyber crime. Some consummating suggestions are introduced according to the deficiency of existing laws in safeguarding information system security and controlling cyber crime in order to play a greater role of laws and regulations in safeguarding the public network information system security.
引文
[1]Marcus K.Rogers.A Social Learning Theory and Moral Disengagement Analysis of Criminal Computer Behavior:An Exploratory Study.http://homes.cerias.purdue.edu/~mkr/cybercrime-thesis.pdf.
    [2]Ghosh,Anup.K.E-Commeroe Vulnerabilities.In:Computer Security Handbook 4~(th) Edition,Part Two.Bosworth/Kabay Wiley,2002.
    [3]Scottsdale,Ariz.Wireless Subscribers to Reach Two Billion by 2007-CDMA to See Dramatic Growth.http://www.instat.com/press.asp?ID=713&sku=IN0301117GW.
    [4]国务院.中华人民共和国计算机信息系统安全保护条例.1994.2.
    [5]王胜航 主编.IT系统安全白皮书.http://www-900.ibm.com/cn/support/guide/whitedbook s/security/security.shtml.
    [6]DOD 5200.28-STD,Department of Defense Trusted Computer System Evaluation Criteria(TCSEC)("The Oraage Book"),National Computer Security Center,Dec.1985.
    [7]Commission of the European Communities,Information Technology Security Evaluation Criteria(ITSEC).Departmeat of Trade and Industry,London,June 1991.
    [8]ISO/IEC 15408:1999 Common Criteria for Information Technology Security.1999.
    [9]钱钢.信息系统安全的工程化管理研究.东南大学,2002.6.
    [10]沈昌祥,蔡谊,赵泽良.信息安全工程技术.计算机工程与科学,2002,24(2):1-8.
    [11]段所云,魏仕民,唐礼勇 等.信息安全概论.北京:高等教育出版社,2003.1.
    [12]Marcinkowski S.J.& Stanton J.M.Motivational aspects of information security policies.Systems,Man and Cybernetics,IEEE International Conference on,2003,3:2527-2532.
    [13]Verdon D.Security politic:;and the software developer.Security & Privacy,IEEE,2006,4(4):42-49.
    [14]Alam Mahtab & Bokhari M.U.Information Security Policy Architecture.Conference on Computational intelligence and Multimedia Applieations,2007,4:120-122.
    [15]冯登国.国内外信息安全研究现状及其发展趋势.网络安全技术与应用,2001,1:8-13.
    [16]郑世慧.现代密码算法研究.中兴通讯技术,2007,5.
    [17]冯登国.国内外密码学研究现状及发展趋势.通信学报,2002,23(5):18-26.
    [18]刘振华,伊萍.信息隐藏技术及应用.北京:科学出版社,2002.
    [19]卿斯汉.安全协议20年研究进展.软件学报,2003,14(10):1740-1752.
    [20]徐国爱.个性化信息安全技术的研究与实现.北京邮电大学,2001.8.
    [21]E.Biermann E.Cloete L.M.Venter A comparison of Intrusion Detection Systems.Computer & Security,2001,20:676-683.
    [22]郭巍,吴承荣,金晓耿,张世永.入侵检测方法概述.计算机工程,1999,25:167-170.
    [23]王晋东,张明清等.信息系统安全技术策略研究.计算机应用研究,2001,5:61-63.
    [24]张原.监控网络关键技术与信息安全研究.西北工业大学,2001.6.
    [25]连一峰,戴英侠.计算机应急响应系统体系研究.中国科学院研究生院学报,2004,21(2):202-209.
    [26]张少俊,李建华.网络安全综合管理系统的设计与实现。计算机工程,2003,29(14):124-126.
    [27]陈文惠.防火墙系统策略配置研究.中国科学技术大学,2007.4..
    [28]韩兰胜.计算机病毒的传播模型及其求源问题研究.华中科技大学,2006.5.
    [29]张小强.几类高效入侵检测技术研究.西南交通大学,2006.5.
    [30]Baker W.H.& Wallace L.Is Information Security under Control?:Investigating Quality in Information Security Management.Security & Privacy,IEEE,2007,5(1):36-44.
    [31]蒋韬,李信满,刘积仁.信息安全模型研究.小型微型计算机系统,2000,21(10):1078-1081.
    [32]黄益民,平玲娣,潘雪增.信息安全模型的研究及安全系统方案设计.浙江大学学报(工学版),2001,35(6):603-607.
    [33]张原,史浩山.信息安全模型研究.小型微型计算机系统,2003,24(10):1878-1881.
    [34]郭小雪.数据库在备份与恢复中的安全策略研究.计算机安全,2007,10:47-50.
    [35]朱红梅,梁虹,高连雄,梁洁.空间数据库的备份与恢复.计算机工程与设计,2005,26(2):323-325.
    [36]岳友宝,张艳,李舟军.金融行业的灾难备份与恢复.计算机应用研究,2006,2:104-106.
    [37]冷健.安全管理和安全策略研究与设计.湖南大学,2006.5.
    [38]闫强.信息系统安全评估研究.北京大学,2003.5.
    [39]刘芳.信息系统安全评估理论及其关键技术研究.国防科学技术大学,2005.4.
    [40]Hone k.and Eloff J.H.P.Information security Policy-What Do International Standards Say? Computers & Security,2002,21(5):402-409,
    [41]Whitman M.E.and Mattord H.J.Management of Information Security.Course Technology Press.2004.
    [42]Forcht K.A.and Ayers W.C.Developing a Computer Security Policy for Organizational Use and Implementation.Journal of Computer Information Systems,2001,41(2):52-58.
    [43]Rees J.and Bandyopadhyay S.A Life Cycle Approach to Information Security Policy for Electronic Commerce,AMCIS 2000.
    [44]李守鹏,孙红波.信息系统安全策略研究.电子学报,2003,31(7):977-980.
    [45]魏亮.网络与信息安全策略的研究.电信科学,2007,2:37-40.
    [46]Farn,K.,Lin,S.,and Fung,A.R.A study on information security management systems evaluation-assets,threats and vulnerability.Computer Standards and Interfaces,2001,19(8):501-503.
    [47]Eloff,J.and Eloff,M.Information Security management-A New Paradigm.Procedings of SAICST,2003:130-136.
    [48]Von Solms,R.Information Security Management:The second Generation.Computer &Security,1996,15(4):281-288.
    [49]Axelsson,S.The base-rate fallacy and the difficulty of intrusion detection.ACM Transactions on Information and System Security(TISSEC),2000,3(3):186-205.
    [50]McHugh,J.Intrusion and intrusion detection.International Journal of Information Security,2001,1(1)14-35.
    [51]Venter,H.S.and Eloff,J.H.P.A taxonomy for information security technologies.Computers and Security,2003,22(4):299-307.
    [52]Eschelbeck,G.Active Seeurity-Aproactive approach for computer security systems.Journal of Network and Computer Applications,2000,23(2):109-130.
    [53]Grance,T.Hash,J.,and Stevens,M.NIST Special Publication 800-64,Security Considerations in the Information System Development Life Cycle,http://csrc.nist.gov/publications/nistpubs/800-64/sp800-64.pdf.
    [54]王伟,李春平,李建彬.信息系统风险评估方法的研究.计算机工程与设计,2007,28(14):3473-3475.
    [55]张竞,薛质,林梦泉.基于威胁分析的信息系统风险评估方法.计算机工程,2004,30(18):56-58.
    [56]王英梅,刘增良,程湘云.信息系统风险评估与管理的定量化方法研究.计算机工程与应用,2005,22:8-10.
    [57]冯妍,房鼎益,陈晓江.一个网络安全风险评估模型的研究与设计.计算机应用与软件,2007,24(5):28-31.
    [58]赵冬梅,马建峰,王跃生.信息系统的模糊风险评估模型.通信学报,2007,28(4):51-56.
    [59]Blyth,A.An XML-based architecture to perform data integration and data unification in vulnerability assessments.Information Security Technical Report,2003,8(4)14-25.
    [60]Collmann,J.Assessing information security risk in dual-use health information systems.International Congress Series,2005,1281:296-301.
    [61]Kamara,S.,Fahmy,S.,Schultz,E.,Kerschbaum,F.and Frantzen,M.,Analysis of vulnerabilities in Internet firewalls.Computers and Security,2003,22(3):214-232.
    [62]Coleman,J.Assessing information security risk in health organization of different scale.International Congress Series,2004,1268:125-130.
    [63]Lamm,GA.and Haimes,Y.Y.Assessing and managing risks to information assurance:A methodological approach.System Engineering,2002,5(4):286-314.
    [64]Veritas软件公司.企业重生--信息系统的灾难恢复,机械工业出版社,2004.6.
    [65]牛云等.数据备份与灾难恢复,机械工业出版社,2004.6.
    [66]ISO DIS 749822.ISO information processing systems:open system interconnection reference model,part2:security architecture.1989.
    [67]ISO/IEC 27001,Information technology Security techniques - Information security management systems -Requirements,2005.
    [68]Anderson J.E.and Schwager P.H.Security in the Information Systems Curriculum:Identification & Status of Relevant Issues.Journal of Computer Information Systems,2002,42(3):16-25.
    [69]Dobson J.A methodology for analyzing human and computer-related issues in secure systems.In:Computer Security and Information Integrity.Dittrieh K.el al.Amsterdam:Elsevier Science Publishers,1991:151-170.
    [70]Forcht K.A.Design and Delivery of an On-Line Masters-Level Course in Information Security.AMCIS,1998.
    [71]Frank J.Shamir B.and Briggs W.Security-related behavior of PC users in organizations.Information & Management,1991,21(3):127-135.
    [72]George B.and Mehta M.Security in Today's E-World.AMCIS,2001.
    [73]Swartz N.Cybercrime Soars.Information Management Journal,2002,36(3):6.
    [74]Whitman M.E.Perez J.and Beise C.A Study of User Attitudes Toward Persistent Cookies.Journal of Computer Information Systems,2001,41(3):I-7.
    [75]McCauley-Bell P.and Crumpton-Young L.The human factors issues in Information security:What are they and do they matter? Proceedings of the Human factors and Ergonomics Society 42~(nd) Annual Meeting,Chicago,1998:439-442.
    [76]Vijayan J.Human Error May Be No.1 Threat to Online Security.Computerworld,2001,35(14):16.
    [77]朱晓欢,黄水清.信息安全管理领域研究现状的统计分析与评价.现代情报,2006,1:24-28.
    [78]杨善林,李兴国,何建民 编著.信息管理学.北京:高等教育出版社,2003.7.
    [79]CNCERT/CC 2007年网络安全工作报告.http://www.cert.org.cn/UserFiles/File/CNCERT CC2007AnnualReport_Chinese.pdf.
    [80]Computer Crime and Security Survey.http://www.coolsir.org/fbi2006.
    [81]MacDonnell Ulsch.Security Strategies for E-Companies.November 2000.http://infosec uritymag.techtarget.com/articles/november00/columns_ec_does_it.shtml.
    [82]Center for Strategic and International Studies(CSIS).Cybercrime,Cyberterrorism,Cyberwarfare.2002.1.22
    [83]Karam,Souhal."Cybercrime yields more cash than drugs."ReutersNews.Nov.28,2005.http://labs.news.yahoo.com/s/nm/20051128/wr_nm/cybercrime_dc.
    [84]Computer Crime Research Center.Cybercrime Cost about $400 billion.July 6,2005.http://www.crime-research.org/news/06.07.2005/1344/.
    [85]Cybercriminal Activities.http://www.cs.ucsd.edu/~cfleizac/WhiteTeam-CyberCrime.pdf.
    [86]James A.Lewis,Assessing the risk of cyber terrorism,Cyber War and Other Cyber Threats.http://www.securitymanagement.com/library/CSIS_Cyberthreat0303.pdf.
    [87]蒋朝惠,许石青.我国信息安全管理的现状、问题及对策.信息化建设,2005,4:44-47.
    [88]王胜航等.IT系统安全白皮书.http://www-900.ibm.com/cn/support/download/security.pdf
    [89]GB17859-1999计算机信息系统安全保护等级划分准则.
    [90]Control Objectives for Information and Related Technology.http://www.isaca.org/cobit.ht ml.
    [91]黄元飞,陈晓桦.国家标准GB/T 18336介绍.信息安全与通信保密,2001,6:70-71.
    [92]GB/T1 8336-2001信息技术 安全技术 信息技术安全性评估准则.
    [93]沈昌祥.构建积极防御综合防范的信息安全保障框架.http://www.iwici.org/english/files/S hen.ppt.
    [94]庞南 著.信息安全管理教程.北京:中国人民公安大学出版社.2007.1.
    [95]中共中央办公厅、国务院办公厅.《2006-2020年国家信息化发展战略》.http://www.cnii.com.cn/20050801/ca350966.htm.
    [96]Peltier,T.R.Preparing for ISO 17799.Security Management Practices,2003,2:21-28.
    [97]Briney,A.and Prince,F.Does Size Matter? The 2002 Information Security Magazine(I SM) survey.http://www.infosecuritymag.com/2002/sep/2002survey.pdf.
    [98]公安部、国家保密局、国家密码管理委员会和国务院信息化工作办公室.关于信息安全等级保护工作的实施意见(公通字[2004]44号),2004.9.
    [99]王春元,杨善林,周永务.信息安全等级测评系统设计.计算机工程与设计,2006,27(13):4457-4460.
    [100]王春元,杨善林,刘心报.公安信息化与信息网络安全保障.中国科技论坛,2007,7:86-89.
    [101]王春元,杨善林,冯响林.信息安全等级保护试点工作的几点体会.第二十二次全国计算机安全学术交流会论文集,2007:66-70.
    [102]王春元,冯响林,刘拥军.信息安全等级保护测评机构的法律责任问题.信息网络安全,2007,11:13-15.
    [103]中央办公厅、国务院办公厅.国家信息化领导小组关于加强信息安全保障工作的意见,2003.9.
    [104]公安部、国家保密局、国家密码管理委员会和国务院信息化工作办公室.关于印发《信息安全等级保护管理办法(试行)的通知》(公通字[2006]7号),2006.1.
    [105]全国信息安全标准化技术委员会.关于印发《信息安全技术 信息系统安全等级保护实施指南》国家标准报批稿的通知(信安字[2007]10号),2007,6.
    [106]GB/T 20282-2006信息安全技术 信息系统安全工程管理要求.
    [107]公安部.信息安全等级保护培训教材,2007.7.
    [108]GB/Z 20985-2007信息技术 安全技术 信息安全事件管理指南.
    [109]沈昌祥.把握焦点问题,推进等级保护工作实施.信息网络安全,2005,14:23-25.
    [110]全国信息安全标准化技术委员会.关于印发《信息安全技术 信息系统安全等级保护基本要求》国家标准报批稿的通知(信安字[2007]12号),2007,6.
    [111]信息系统安全等级保护测评准则(送审稿).
    [112]王春元,杨善林,周永务.信息安全等级测评多层次灰关联综合评价.第二十一次全国计算机安全学术交流会论文集,2006:33-66.
    [113]魏蓉,郐吉丰,王春元,蒋凡.等级保护中的系统自动化测试.第二十一次全国计算机安全学术交流会论文集,2006:76-78.
    [114]杜栋,庞庆华,吴炎著.现代综合评价方法与案例精选.北京:清华大学出版社,2008.6.
    [115]刘思峰,党耀国,张岐山 著.灰色系统理论及其应用(第三版).北京:科学出版社,2007.1.
    [116]刘思峰.灰色系统理论的产生与发展.南京航空航天大学学报.2004,36(2):267-272.
    [117]易德生,郭萍编著.灰色理论与方法--提要·题解·程序·应用.北京:石油工业出版社,1992.1.
    [118]全国信息安全标准化技术委员会.关于印发《信息安全技术 信息系统安全等级保护定级指南》国家标准报批稿的通知(信安字[2007]11号),2007.6.
    [119]Computer Security Institute(CSI).Information Protection Assessment Kit(IPAK).http://www.gocsi.corn/press/prelea991122.jhtml.
    [120]Gerber,M.and von Solms,R.From Risk Analysis to Security Requirements.Computers & Security,2001.20:pp577-584.
    [121]National Institute of Standards and Technology(NIST),Federal Information Technology Security Assessment Framework.Computer Security Division,Systems and Network Security Group,November 28,2000,http://www.cio.gov/archive/federal it security_asse s sment framework.html.
    [122]Swanson,M.Security.Self-Assessment Guide for Information Technology Systems.Nist Special Publication 800-26,November 2001,http://csrc.nist.gov/publicationns/nistpubs/800-26/sp800-26.pdf.
    [123]特别报道:20年最强病毒排行榜.http://tech.163.com/06/1020/10/2TSBHTRI00091KUI.html.
    [124]CNCERT/CC.2007年上半年网络安全工作报告.http://www.cert.org.cn/UserFiles/File/CNCERTCC200701.pdf.
    [125]公安部.58%被调查单位发生网络安全事件.http://www.5dmail.net/html/2004-10-9/2004109103650.htm.
    [126]王常吉,段海新,吴建平.计算机应急响应服务中安全事件分类方法研究.中山大学学报,2005,第44卷增刊.
    [127]http://www.first.gov.
    [1 28]GB/Z 20986-2007信息技术 安全技术 信息安全事件分类分级指南.
    [129]CNCERT/CC.2005年网络安全工作报告.http://www.cert.org.cn/upload/2005CNCERTC CAnnualReport_Chinese.pdf.
    [130]邢戈,张玉清,冯登国.网络安全管理平台研究.计算机工程,2004,30(10):129-131.
    [131]王春元,杨善林,周永务.一种互联网病毒威胁的风险评估方法.计算机应用研究(增刊),2006:1194-1196.
    [132]王春元,杨善林,刘拥军.信息网络安全事件监测与响应平台设计.第二十二次全国计算机安全学术交流会论文集,2007:42-45.
    [133]冯涛,张玉清,高有行.网络安全事件应急响应联动系统模型.计算机工程,2004,30(13):101-103.
    [134]安徽省“十一五”二期信息网络安全事件监测及应急处置系统项目组.信息网络安全事件监测及应急处置系统技术研究总结报告,2006,9.
    [135]赵斌,刘长起,戴英侠.Windows操作系统的文件操作监控技术.计算机工程与应用,2004.31:131-133.
    [136]王雨,傅鹤岗.挂接系统服务调度表对Win2K的访问控制.计算机工程与设计,2005,26(2):407-409.
    [137]余昌盛,许力,权毓舒.Windows NT注册表的动态监控与静态分析研究.计算机应用,2003,23(3):113-115.
    [138]李伟斌,王华勇,罗平.通过注册表监控实现木马检测.计算机工程与设计,2006,27(12):2220-2222.
    [139]Prasad Dabak,Milind Borate.Undocumented Windows NT.M&T Books,1999.
    [140]尤晋元,史美林等编著.Windows操作系统原理.北京:机械工业出版社,2001.8.
    [141]沈祥玖 主编.操作系统原理与Windows NT系统.北京:高等教育出版社,2004.2.
    [142]Art Baker(美)著,科欣翻译组译.Windows NT设备驱动程序设计指南.北京:机械工业出版社,1997.12.
    [143]November 2006 Web Server Survey.http://news.netcraft.com/archives/2006/11/01/novem ber_2006_web_server_.survey.html.
    [144]中国互联网络信息中心.中国互联网络发展状况统计报告(19).http://www.cnnic.net.cn/uploadfiles/doc/2007/1/22/212245.doe.
    [145]陈汉深,李卫忠.基于C/S的新一代智能化、个性化搜索引擎.情报学报,2006,25(1):70-73.
    [146]潘春华,冯太明。武港山.基于移动爬虫的专用Web信息收集系统的设计.计算机工程与应用,2003,36:153-156.
    [147]搜索引擎分类.http://www.se-express.com/about/aboutl.htm.
    [148]搜索引擎发展史.http://www.se-express.comaboutabout.htm.
    [149]刘海涛.Web信息抽取及搜索引擎的研究.南京大学,2001.2.
    [150]朱明.互联网信息智能搜索与获取方法研究.中国科学技术大学,2001.3.
    [151]蔡智.基于Web的中文信息智能获取研究.中国科学技术大学,2002.4.
    [152]杜亚军.搜索引擎智能行为的研究及实现.西南交通大学,2005.11.
    [153]陈治平.智能搜索引擎理论与应用研究.湖南大学,2003.2.
    [154]李志义.搜索引擎发展中的问题与对策.情报科学,2002,20(5):556-558.
    [155]Martijn Koster.A proposal Standard for Robot Exclusion.http://www.robotstxt.org/wc/e xclusion.html.
    [156]Martijn Koster.Guiderlines for Robot Writers.http://www.robotstxt.org/wc/guidelines.ht ml.
    [157]Martijn Koster.WWW Robots,Wanderers and Spiders.http://www.robotstxt.org/wc/robots.html.
    [158]曾福兴.搜索引擎.情报学报(增刊),1999,18:153-157.
    [159]什么是垂直搜索?http://www.fullsearcher.com/n20051112144420735.asp.
    [160]全面解读垂直搜索引擎.http://homepage.yesky.com/81/2290581_1.shtml.
    [161]专业搜索引擎.http://www.sowang.com/SEARCH/zhuanye_search.htm.
    [162]专业搜索引擎大全.http://www.yacou.com/deng/4.htm.
    [163]Special Page for NewsTracker.http://www.scripting.com/specials/newsTracker.html.
    [164]The Power of Current Awareness.http://www.moreover.com/.
    [165]Robert Wilson.The Best Site for Active Job Search - Indeed.http://rmwilsonconsulti ng.typepad.com/job_search_engine_guide/2006/02/the_best site_f.html.
    [166]A.Kruger,C.L.Giles,F.M.Coetzee etc.DEADLINER:Building a New Niche Search Engine.http://clgiles.ist psu.edu/papers/CIKM-2000-deadliner.pdf.
    [167]TravelFinders-The travel Information portal,http:\www.travelfmders.com.
    [168]国务院第.互联网信息服务管理办法.2000.9.
    [169]王春元,杨善林,周永务.固定网站内特定内容的监测及获取方法.情报学报(增刊),2007.7:564-567.
    [170]中国互联网信息中心.中国互联网络发展状况统计报告(16).http://www.cnnic.net.c n/ uploadfiles/pdf/2005/7/20/210342.pdf.
    [171]程冲,黄水清.利用正则表达式解析新闻网页的算法研究.农业图书情报学刊,2005,17(4):5-8.
    [172]赵兴涛,王斌君,刘舒.正则表达式在文档自动识别中的应用.中国人民公安大学学报(自然科学版),2005,46:33-35.
    [173]杨桢,赵燕平,朱东华.基于正则表达式的信息抽取在国防技术监测中的应用.北京理工大学学报(增刊),2006,26:74-78.
    [174]李剑,金蓓弘.Web链接结构信息研究综述.计算机科学,2003,30(4):95-97.
    [175]杨小华.Web站点的超链结构挖掘.计算机工程与应用,2001,37(8):64-66.
    [176]Relative Uniform Resource Locators,http://www.faqs.org/rfcs/rfc1808.html.
    [177]王志琪,王永成.HTML文件的文本信息预处理技术.计算机工程,2006,32(5):46-48.
    [178]Xiaoguang Li,Jian Gong,Daling Wang etc.An Effective and Efficient Approach for Keyword-Based XML Retrieval.In:The 6th International Conference on Web-Age Information Management(WAIM 2005),2005:56-67.
    [179]田萱,孟祥光,刘希玉.智能信息检索中个性化模式的表示形式研究.情报学报,2004,23(1):21-26.
    [180]孙承杰,关毅.基于统计的网页正文信息抽取方法的研究.中文信息学报,2004,18(5):17-22.
    [181]Hammer J.,McHugh J.Semi2structured Data:The TSIMMIS Experience.In:Proceeding of the FirstEast2European Symposium on Advance in Databases and Information Systems.1997:1-8.
    [182]Liu,L.& Pu,C.et al.XWRAP:An XML2enable Wrapper Construction System for the Web Information Source.In:proceedings of the 16th IEEE International Conference on Data Engineering,2000:611-620.
    [183]Valter Crescenzi,Giansalvatore Mecca.RoadRunner:Towards Automatic Data Extraction from Large WebSite.In:proceeding of the 26th International Conference on very Large Database Systems,2001:109-118.
    [184]Alberto H.F.Laender,Berthier A.Ribeiro2Neto.A Brief Survey of Web Data Extraction Tools.SIG2 MOD Record.2002,31(2):84-93.
    [185]杨桢,赵燕平,朱东华.基于正则表达式的信息抽取在国防技术监测中的应用.北京理工大学学报(增刊),2006,26:74-78.
    [186]朱永盛,武港山.基于Web的新闻信息抽取.计算机工程,2006,5:74-76.
    [187]于琨,蔡智等.基于路径学习的信息自动抽取方法.小型微型计算机系统,2003,12(24):2147-2149.
    [188]周源远 王继成等.Web页面清洗技术的研究与实现.计算机工程,2002,9:48-50.
    [189]张彦 著.计算机犯罪及其社会控制.南京:南京大学出版社,2000.4.
    [190]刘广三 著.计算机犯罪论.北京:中国人民大学出版社,1999.6.
    [191]蒋平著.计算机犯罪问题研究.上海:商务印书馆,2000.8.
    [192]夏锦尧 主编.计算机犯罪问题的调查分析与防范.北京:中国人民公安大学出版社, 2001.4.
    [193]刘守芬、孙晓芳.论网络犯罪.北京大学学报(哲学社会科学版),2001,3(38):114-122.
    [194]赵秉志,于志刚.论计算机犯罪的定义.现代法学,1998,5:7-10.
    [195]张昱.论虚拟条件下主体的生存方式.吉林大学社会科学学报,2001,3:80-86.
    [196]于学德.网络犯罪的特点及其防范.中国律师,1998,9:40.
    [197]康树华著.犯罪学-历史·现状·未来,群众出版社1998,9:542.
    [198]Michael Hatcher,Jay McDannell and Stacy Ostfeld:Computer Crimes,American Criminal Law Review,Summer 1999.
    [199]于志刚著.计算机犯罪研究.北京:中国检察出版社,1999,10.
    [200]周良洪著.公共信息网络安全战略.武汉:湖北科学技术出版社,2000.12.
    [201]罗结珍译,高铭暄专业审校.法国刑法典.北京:中国人民公安大学出版社,1995,5.
    [202]黄道秀等译,何秉松审订 俄罗斯联邦刑法典.北京:中国法制出版社,1996,11.
    [203]胡学相,吴锴.论计算机犯罪的几个问题.华南理工大学学报(社会科学版),2004,6(6):14-17.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700