期刊文献+

入侵检测系统中模式匹配算法的研究 被引量:20

The Survey of the Pattern Matching Algorithm in Intrusion Detection System
下载PDF
导出
摘要 互联网的开放性为信息共享和交互提供了极大的便利,但随之而来的网络安全问题也日益明显.入侵检测作为一种主动的信息安全保障措施,有效的弥补了传统安全防护技术的缺陷.主要分析了目前在入侵检测领域常用的模式匹配算法,如KMP算法和BM算法.并在此基础之上,提出了一种新的模式匹配算法.结果表明,改进后的算法具有更高的效率,有利于降低系统的丢包率. The openness of Internet offers great convenience of information sharing and exchange, accompanied with crucial challenges to Information Security. As a kind of active measure of Information Assurance, Intrusion Detection acts as the effective complement to traditional protection techniques. On the base of analyzing KMP algorithm &BM algorithm, which are fashionable pattern matching algorithms in intrusion detection system at present, the author gives an new pattern matching algorithm in place of the BM algorithm. The results show that the improved pattern matching algorithm has better effficiencyand is helpful to reduce systematical missing package rate.
出处 《电子学报》 EI CAS CSCD 北大核心 2006年第B12期2488-2490,共3页 Acta Electronica Sinica
关键词 KMP算法 BM算法 入侵检测 KMP algorithm BM algorithm intrusion detection
  • 相关文献

参考文献8

  • 1Knuth D E, Morris J H, Pratt V R. Fast pattern matching in strings[J]. SIAM Journal on Computing, 1997,6 ( 1 ) : 323 -350.
  • 2R S Boyer, J S Moore. A fast string searching algorithm [J].Commun. ACM, 1977,20(10) :762 - 772.
  • 3Boyer RS. Moore J S. A fast string searching algorithm [ J].Communications of the ACM, 1977,20(10) :762 - 772.
  • 4HORSPOOL RN. Practical fast searching in strings [ J]. Software-Practice and Experience, 1980,10(6) :501 - 506.
  • 5Daniel M Sunday. A very fast substring search algorithm[J].Commun. ACM, 1990,33(8):132 - 142.
  • 6伊静,刘培玉.入侵检测中模式匹配算法的研究[J].计算机应用与软件,2005,22(1):112-114. 被引量:14
  • 7苏璞睿,冯登国.基于进程行为的异常检测模型[J].电子学报,2006,34(10):1809-1811. 被引量:17
  • 8刘功申,王永成,许欢庆.基于字频的单模式匹配算法[J].电子学报,2002,30(12A):2079-2082. 被引量:3

二级参考文献15

  • 1姚灏 卢显良.[D].电子科技大学,.
  • 2BoSetng, MingYe, JieLi, Intrusion Detection Technolosy Research Based High-Speed Network.
  • 3BoSetng, MingYe, JieLi. Intrusion Detection Technolosy Research Based High-Speed Network.
  • 4马振华.现代应用数学手册-概率统计与随机过程卷[M].北京:清华大学出版社,2002..
  • 5CERT Coordination Center,CERT/CC Overview Incident and Vulnerability Trends[OL],http://www.cert.org/present/cert-overview-trends/
  • 6S Forrest,S A Hofmeyr,A Somayaji and T A Longstaff.A sense of self for unix processes[A].In Proceedings of 1996IEEE Symposium on Computer Security and Privacy[C].1996.
  • 7Wenke Lee,Dong Xiang.Information-Tneoretic Measures for Anomaly Detection[A].In Proceedings of the 2001 IEEE Symposium on Security and Privacy[C].2001.
  • 8Steven A Hofmeyr.Stephanie Forrest,Anil Somayaji.Intrusion detection using sequences of system calls[J].Journal of Computer Security,1998,6:
  • 9Chowalit Tinnagonsutibout,Pirawat Watanapongse.A novel approach to process-based intrusion detection system using readsequence finite state automata with inbound byte proler[A].ICEP2003[C].2003.
  • 10N Nuansri.A process state-transition analysis and its application to intrusion detection[A].15th Annual Computer Security Applications Conference[C].1999.

共引文献30

同被引文献140

引证文献20

二级引证文献105

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部