US$369.00 · In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 26269-2010: Technical requirements for network intrusion detection system Status: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
GB/T 26269-2010 | English | 369 |
Add to Cart
|
3 days [Need to translate]
|
Technical requirements for network intrusion detection system
| Valid |
GB/T 26269-2010
|
PDF similar to GB/T 26269-2010
Basic data Standard ID | GB/T 26269-2010 (GB/T26269-2010) | Description (Translated English) | Technical requirements for network intrusion detection system | Sector / Industry | National Standard (Recommended) | Classification of Chinese Standard | M54 | Classification of International Standard | 33.040.40; 33.200 | Word Count Estimation | 16,192 | Date of Issue | 2011-01-14 | Date of Implementation | 2011-06-01 | Quoted Standard | GB 4943-2001; GB 9254-2008; GB/T 17618-1998 | Regulation (derived from) | National Standard Approval Announcement 2011 No.2 (Total No.167) | Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China | Summary | This standard specifies the system architecture of network intrusion detection system. Test content, response mode, system management. Log audit their own safety, performance indicators, and physical security. This standard applies to grab the side of the network intrusion systems and related equipment. |
GB/T 26269-2010: Technical requirements for network intrusion detection system---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Technical requirements for network intrusion detection system
ICS 33.040.40; 33.200
M54
National Standards of People's Republic of China
Network Intrusion Detection System Technical Requirements
Issued on. 2011-01-14
2011-06-01 implementation
Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
Standardization Administration of China released
Table of Contents
Preface Ⅰ
Introduction Ⅱ
1 Scope 1
2 Normative references 1
3 Terms and definitions
4 Abbreviations 2
5 System Description 3
4 6 detects content
7 Response Mode 4
8 System Management 5
9 Log Audit 6
10 own safety 7
11 Performance Indicators 8
12 Physical Security 8
Appendix A (informative) Event Category 9
Reference 10
Foreword
This standard is one of the series of standard network intrusion detection system. The name of the series of standards are as follows.
--- Network intrusion detection system technical requirements;
--- Network intrusion detection system testing methods.
Appendix A of this standard is an informative annex.
The standard proposed by the Ministry of Industry and Information Technology of the People's Republic of China.
The standard by the China Communications Standards Association.
This standard was drafted. the Ministry of Industry and Information Technology and Telecommunications Research Institute, Beijing Venus Information Technology Co., Ltd., Beijing Telecom Planning and Design
Design Institute Co., Ltd., Huawei Technologies Co., Ltd.
Drafters of this standard. Falling Hongwei, Chu Jianmei, Wu Haimin, Chen Ping, Miao Fuyou, Liu book, Xia Junjie.
Introduction
Network intrusion detection system is a collection of information from several key IP networks and analyze them from the network if there is found
Or security policy violations were signs of the invasion, and to take certain measures in accordance with the established policy of the system.
Network Intrusion Detection Technology is a dynamic network security core technology, related equipment and systems is an important component of the overall security system
section. At present, the firewall is static security defense technology, but attacks the ever-changing network environment and the lack of active monitoring ring
should. The network intrusion detection system capable of real-time response to network intrusion events and processes, and firewall tied for network and information security
Core equipment.
Network Intrusion Detection System Technical Requirements
1 Scope
This standard specifies the system structure of the network intrusion detection system to detect the content of the response mode, system management, audit logs, their own safety,
Performance and physical security.
This standard applies to network intrusion detection systems and related equipment.
2 Normative references
The following documents contain provisions which, through reference in this standard and become the standard terms. For dated references, subsequent
Amendments (not including errata content) or revisions do not apply to this standard, however, encourage the parties to the agreement are based on research
Whether the latest versions of these documents. For undated reference documents, the latest versions apply to this standard.
GB 4943-2001 Safety of information technology equipment
Limits and methods of measurement of radio disturbance of information technology equipment GB 9254-2008
GB/T 17618-1998 Information technology equipment immunity limits and methods of measurement
3 Terms and Definitions
The following terms and definitions apply to this standard.
3.1
Alarm alert
Alarm refers to the network intrusion detection system detects intrusion, the message has to publish administrative roles entity.
3.2
Attack attack
Attack is any computer resources and network resources, threatening the integrity, confidentiality or availability of behavior.
3.3
Automatic response automatedresponse
Automatic response is the protection of network intrusion detection system behavior after the discovery of spontaneous attacks taken.
3.4
Avoid evasion
Avoidance refers to an intruder attack, and do not want to be found and action taken.
3.5
Omission falsenegatives
Omission means that the attacks were not a network intrusion detection system detects the resulting errors.
3.6
False falsepositives
False positive refers to the system as a normal behavior and intrusion alarm, or to report an attack error and lead to another attack
System error induced response.
3.7
Firewall firewal
Execute one or a group of devices to access control policies across the network.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 26269-2010_English be delivered?Answer: Upon your order, we will start to translate GB/T 26269-2010_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 26269-2010_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 26269-2010_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|