期刊文献+

IDS模型的设计与研究

The study and design of IDS model
下载PDF
导出
摘要 入侵检测系统(IDS)成为目前动态安全工具的主要研究和开发方向。异常检测和误用检测是应用在IDS中的两种主要技术,本文把应用在异常检测中的Markov链和误用检测中的模式匹配结合起来,同时采用分组交换检测机制,一定程度上降低了IDS的误报率和漏报率,提高了系统的检测速度。而数据挖掘技术的引入,使系统具有了自动化能力。 At present time Intrusion Detection System(IDS)becomes the main research and develop- ment in the dynamic safe tool.Anomaly Detection and Misuse Detection are two kinds of the main technique that are applied in IDS.This paper integrates Markov chain applied in Anomaly Detection with Pattern matching applied in Misuse Detection and adopts grouping and exchanging detection.To a certain extent they reduce the false positive rate and the false negative rate and improve the detection speed of IDS.And data mining...
出处 《自动化与仪器仪表》 2008年第4期28-30,36,共4页 Automation & Instrumentation
关键词 入侵检测 数据挖掘 MARKOV链 模式匹配 Intrusion detection system(IDS) Data mining Markov chain Pattern matching
  • 相关文献

参考文献3

  • 1刘永健,徐昕,王正华,薛倡新.基于数据挖掘的自适应入侵检测框架设计[J].计算机工程与应用,2006,42(14):152-154. 被引量:9
  • 2[4]邵波,王其和.计算机网络安全技术及应用[M].北京:电子工业出版社,2006
  • 3[5]Forrest S,Hofmeyr S A,Somayaji A,et al.A Sense of Self for Unix Processes.In:Proceed-ings of the 1996 IEEE Symposium on Security and Privacy.Orkland California.1996:120-128

二级参考文献7

  • 1Yu-Sung Wu,Bingrui Foo,Yongguo Mei et al.Collaborative Intrusion Detection System(CIDS):A Framework for Accurate and Efficient IDS[C].In:Proceedings of the 19th Annual Computer Security Applications Conference(ACSAC 2003),2003.
  • 2Tao Zou,Hongwei Sun,Xinguang Tian et al.Modeling A Self-learing Detection Engine Automatically for IDS[C].In:Proceedings of the 2003IEEE International Conference on Robotics,Intelligent System and Signal Processing,Changsha,China,2003.
  • 3Ning P,Cui Y,Reeves D S.Constructing attack scenarios through correlation of intrusion alerts[C].In:Proceedings of the 9th ACM Conference on Computer & Communications Security,Washington,USA:ACM Press,2002:245~254.
  • 4Valdes A,Sknner K.Probabilistic alert correlation[C].In:Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection,Springer-Verlag,2001:54~68.
  • 5Lee W,Stolfo S,Mok K.A data mining framework for adaptive intrusion detection.http://www.cs.columbia.edu/~sal/hpapers/framework.ps.gz.
  • 6Lee W,Stolfo S J,Mok K.Algorithms for mining system audit data.http://citeseer.ist.psu.edu/lee99algorithms.html,1999.
  • 7LiQun Zhang,Richard Shiavi,Member et al.Clustering Analysis and Pattern Discrimination of EMG Linear Envelopes[J].IEEE Transactions on biomedical engineering,1991;38(8).

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部