期刊文献+

一种入侵检测取证系统模型的设计 被引量:7

Design of IDS and Computer Forensic System
下载PDF
导出
摘要 随着网络技术的发展,黑客攻击现象越来越多。计算机取证技术是当今一种热门的动态安全技术,它采用主动出击的方法,搜集入侵证据,查出黑客的来源,有效地防范黑客入侵。文中提出了一种入侵检测取证系统模型,它考虑把入侵检测和计算机取证技术结合在一起。在遭受入侵时它能实时地收集可靠的证据,完成入侵事件的检测和取证分析,弥补了入侵检测的不足,有效地阻止了黑客攻击。文章详细介绍了入侵检测取证的过程和方法,并讨论了系统存在的问题。 With the development of Web,more and more hacker attacks appear.Computer forensic is a dynamic security technology.It collects the proofs of intrusion and finds the source of hacker with the active methods,so it can prevent hacker intrusion effectively.The paper proposes the model of IDS and computer forensic system.It connects intrusion detection and computer forensic.It can collect the proofs timely and accomplish the analysis of detection and forensic when intruded.This system makes up the lack of intrusion detection,and prevents hacker attacks effectively. The paper introduces progress and methods of intrusion detection and forensic in detail,and discusses some problems of the system.
出处 《微机发展》 2004年第8期117-119,共3页 Microcomputer Development
关键词 计算机取证 入侵检测 日志审计 数据挖掘 computer forensic intrusion detection log audit data mining
  • 相关文献

参考文献6

  • 1Lunn D A.Computer Forensics:An Overview[EB/OL].http: //www.sans.org/ infosecFAQ/incident/ forensics.htm,2001-02-20.
  • 2Sommer P.Intrusion Detection Systems as Evidence[EB/OL].http://www.raid-symposium.org/raid98/Prog-RAID98/Full-Papers/Sommer-text.pdf,2002-04-05.
  • 3Stephenson P, Netigy Corporation,Jose S.The Application of Intrusion Detection Systems in a Forensic Environment[EB/OL].http://www.raid-symposium.org/raid2000/Materials/Abstracts/47/47.pdf,2000-08-21.
  • 4钱桂琼,杨泽明,许榕生.计算机取证的研究与设计[J].计算机工程,2002,28(6):56-58. 被引量:55
  • 5蒋嶷川,田盛丰.入侵检测中对系统日志审计信息进行数据挖掘的研究[J].计算机工程,2002,28(1):159-161. 被引量:22
  • 6Yuill J,Wu S F,Gong F,et al.Intrusion Detection for an On-Going Attack[EB/OL].http://www.raid-symposium.org/raid99/PAPERS/Yuill.pdf,2002-04-05.

二级参考文献9

  • 1[1]Lunn D A.Computer Forensics:An Overview. http://www.sansorg, 2001-02
  • 2[2]3 Day Computer Forensics Training Course: Oregon.http://www. forensics-intl.com,2001
  • 3[3]Computer Forensics Training Center Online.http://www.cftco.com, 2001
  • 4[4]Robbins J.An Explanation of Computer Forensics.http://www.computerforensics.net,2001
  • 5Agrawal R, Strikard R. Fast Algorithms for Mining Association Rules.In Proceedings of the 20th ULDB Conferance,Santiago, Chile, 1994
  • 6Klemettinen M,Mannila H,Ronkainen P, et al.Finding Interesting Rules from Large Sets of Discovered Association Rules. In Proceedings of the 3rd Intemational Conference on Information and Knowledge Management(CIKM'94),Gainthersburg, MD, 1994:401-407
  • 7Stolfo S L, Promidis A L.Tselepis S,et al. JAM:Java Agents for Metalearning Overdistributed Databases. In Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining,Newport Beach,CA,AAAI Press, 1997-08:74-81
  • 8刘美兰,姚京松.审计跟踪与入侵检测[J].计算机工程与应用,1999,35(7):12-15. 被引量:12
  • 9刘明吉,王秀峰,黄亚楼.数据挖掘中的数据预处理[J].计算机科学,2000,27(4):54-57. 被引量:125

共引文献75

同被引文献17

引证文献7

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部