期刊文献+

基于Magician平台的主动入侵检测模型

The Active Intrusion Detecting Model Based on Magician
下载PDF
导出
摘要 首先分析了当前入侵检测系统的研究现状和存在的一般缺陷,然后在分析主动网络平台Magician的体系结构和传输与执行Smart包原理的基础上,提出了一个基于Magician平台的主动入侵检测模型;最后对基于主动网络平台的入侵检测系统将来的研究领域作了一些探讨。 It is analysed for the research status and the problems of current intrusion detection systems (IDSs). Based on analyzing the structure of Magician which is an active network platform and the way how to transfer and execute Smart packages on this perform, the active intrusion detecting model based on Magician is proposed. Some specific research topics are presented.
出处 《仪器仪表学报》 EI CAS CSCD 北大核心 2005年第z2期43-46,共4页 Chinese Journal of Scientific Instrument
基金 吉林大学创新基金项目(2003CX041)资助。
关键词 入侵检测 主动网络 网络安全 Magician IDS Active network Network security Magician
  • 相关文献

参考文献6

二级参考文献13

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8Mark R B,Kesdogan D.Transaction-based anomaly detection[]..1999
  • 9胡华平,陈海涛,黄辰林,唐勇.入侵检测系统研究现状及发展趋势[J].计算机工程与科学,2001,23(2):20-25. 被引量:52
  • 10何明耘,戴冠中.分布式入侵检测体系结构研究[J].计算机工程与应用,2001,37(15):5-8. 被引量:20

共引文献142

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部