HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GB/T 26269-2010 English PDF

US$369.00 · In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 26269-2010: Technical requirements for network intrusion detection system
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 26269-2010English369 Add to Cart 3 days [Need to translate] Technical requirements for network intrusion detection system Valid GB/T 26269-2010

PDF similar to GB/T 26269-2010


Standard similar to GB/T 26269-2010

JT/T 808   JT/T 1078   GB/T 19392   GB/T 44434   GB/T 26268   

Basic data

Standard ID GB/T 26269-2010 (GB/T26269-2010)
Description (Translated English) Technical requirements for network intrusion detection system
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard M54
Classification of International Standard 33.040.40; 33.200
Word Count Estimation 16,192
Date of Issue 2011-01-14
Date of Implementation 2011-06-01
Quoted Standard GB 4943-2001; GB 9254-2008; GB/T 17618-1998
Regulation (derived from) National Standard Approval Announcement 2011 No.2 (Total No.167)
Issuing agency(ies) General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China
Summary This standard specifies the system architecture of network intrusion detection system. Test content, response mode, system management. Log audit their own safety, performance indicators, and physical security. This standard applies to grab the side of the network intrusion systems and related equipment.

GB/T 26269-2010: Technical requirements for network intrusion detection system

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Technical requirements for network intrusion detection system ICS 33.040.40; 33.200 M54 National Standards of People's Republic of China Network Intrusion Detection System Technical Requirements Issued on. 2011-01-14 2011-06-01 implementation Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China Standardization Administration of China released

Table of Contents

Preface Ⅰ Introduction Ⅱ 1 Scope 1 2 Normative references 1 3 Terms and definitions 4 Abbreviations 2 5 System Description 3 4 6 detects content 7 Response Mode 4 8 System Management 5 9 Log Audit 6 10 own safety 7 11 Performance Indicators 8 12 Physical Security 8 Appendix A (informative) Event Category 9 Reference 10

Foreword

This standard is one of the series of standard network intrusion detection system. The name of the series of standards are as follows. --- Network intrusion detection system technical requirements; --- Network intrusion detection system testing methods. Appendix A of this standard is an informative annex. The standard proposed by the Ministry of Industry and Information Technology of the People's Republic of China. The standard by the China Communications Standards Association. This standard was drafted. the Ministry of Industry and Information Technology and Telecommunications Research Institute, Beijing Venus Information Technology Co., Ltd., Beijing Telecom Planning and Design Design Institute Co., Ltd., Huawei Technologies Co., Ltd. Drafters of this standard. Falling Hongwei, Chu Jianmei, Wu Haimin, Chen Ping, Miao Fuyou, Liu book, Xia Junjie.

Introduction

Network intrusion detection system is a collection of information from several key IP networks and analyze them from the network if there is found Or security policy violations were signs of the invasion, and to take certain measures in accordance with the established policy of the system. Network Intrusion Detection Technology is a dynamic network security core technology, related equipment and systems is an important component of the overall security system section. At present, the firewall is static security defense technology, but attacks the ever-changing network environment and the lack of active monitoring ring should. The network intrusion detection system capable of real-time response to network intrusion events and processes, and firewall tied for network and information security Core equipment. Network Intrusion Detection System Technical Requirements

1 Scope

This standard specifies the system structure of the network intrusion detection system to detect the content of the response mode, system management, audit logs, their own safety, Performance and physical security. This standard applies to network intrusion detection systems and related equipment.

2 Normative references

The following documents contain provisions which, through reference in this standard and become the standard terms. For dated references, subsequent Amendments (not including errata content) or revisions do not apply to this standard, however, encourage the parties to the agreement are based on research Whether the latest versions of these documents. For undated reference documents, the latest versions apply to this standard. GB 4943-2001 Safety of information technology equipment Limits and methods of measurement of radio disturbance of information technology equipment GB 9254-2008 GB/T 17618-1998 Information technology equipment immunity limits and methods of measurement

3 Terms and Definitions

The following terms and definitions apply to this standard. 3.1 Alarm alert Alarm refers to the network intrusion detection system detects intrusion, the message has to publish administrative roles entity. 3.2 Attack attack Attack is any computer resources and network resources, threatening the integrity, confidentiality or availability of behavior. 3.3 Automatic response automatedresponse Automatic response is the protection of network intrusion detection system behavior after the discovery of spontaneous attacks taken. 3.4 Avoid evasion Avoidance refers to an intruder attack, and do not want to be found and action taken. 3.5 Omission falsenegatives Omission means that the attacks were not a network intrusion detection system detects the resulting errors. 3.6 False falsepositives False positive refers to the system as a normal behavior and intrusion alarm, or to report an attack error and lead to another attack System error induced response. 3.7 Firewall firewal Execute one or a group of devices to access control policies across the network.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 26269-2010_English be delivered?

Answer: Upon your order, we will start to translate GB/T 26269-2010_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 26269-2010_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 26269-2010_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.