期刊文献+

网络攻击分类技术综述 被引量:36

Survey of network attack classification
下载PDF
导出
摘要 概要介绍了国内外关于网络攻击分类技术的研究现状,并对其发展趋势进行了分析。 This paper introduces the status quo of network attack classification summarily, and the trend is analysed.
作者 刘欣然
出处 《通信学报》 EI CSCD 北大核心 2004年第7期30-36,共7页 Journal on Communications
关键词 网络攻击 分类 特征提取 network attack classification feature extraction
  • 相关文献

参考文献24

  • 1CERT/CC Statistics(CERT Coordination Center)[EB/OL]. http://www.cert.org/stats, 2004.
  • 2AMOROSO E. Fundamentals of Computer Security Technology[M]. Prentice-Hall, 1994.
  • 3BISHOP M. Vulnerabilities analysis[A]. Second International Symposium on Recent Advances in Intrusion Detection[C]. USA, 1999. 125-136.
  • 4HOWARD J. An Analysis of Security Incidents on the Internet[D]. USA: Carnegie Mellon University, 1997.
  • 5KRSUL I. Computer Vulnerability Analysis[R]. The COAST Laboratory, Department of Computer Sciences, Purdue University, 1997.
  • 6LINDQVIST U, JONSSON E. How to systematically classify computer security intrusions[A]. 1997 IEEE Symposium on Security and Privacy[C]. USA, 1997. 154-163.
  • 7ICOVE D, SEGER K, VONSTORCH W. Computer Crime: A Crimefighter's Handbook[M]. O'Reilly & Associates, Inc. 1995.
  • 8COHEN F. Information system attacks: a preliminary classification scheme[J]. Computers and Security, 1997, 16(1):29-46.
  • 9TEKLA P, PAUL W. Can computer crime be stopped?[J]. IEEE Spectrum, 1984, 21(5): 34-45.
  • 10RUSSELL D, GANGEMI G. Computer Security Basics[M]. O'Reilly & Associates, Inc, 1991.

二级参考文献11

  • 1向尕 曹元大 周旭.基于攻击树的IDS攻击模式自动建立研究[Z]..中国科协首届博士生学术交流大会[C].深圳,2002..
  • 2Neumann P G, Parker D B. A summary of computer misuse techniques [Z]. The 12th National ComputerSecurity Conf. Baltimore, Maryland, 1989.
  • 3Carl E L, John P M. A taxonomy of computer program security flaws with examples [R].Washington: Naval Research Laboratory, 1993.
  • 4Frank A, Andrew H, Shlomo H, et al. Detecting malicious software by monitoring anomalous windows registry accesses[Z]. The Fifth International Symposium on Recent Advances in Intrusion Detection(RAID-2002), Zurich, Switzerland, 2002.
  • 5John D H. An analysis of security incident on the internet[J]. West Lafayette: Computer Department,Carnegie Mellon University, 1995.
  • 6Indqvist U L, Jonsson E. How to systematically classify computer security intrusions [Z]. IEEE Symposium on Security and Privacy, Oakland, 1997.
  • 7Sandeep K. Classification and detection of computer intrusions[D]. West Lafayette: Computer Department Purdue University, 1995.
  • 8Helmer G,Wong J,Slagell M,et a1.A software fault tree approach to requirements analysis of an intrusion detection system[Z]. Symposium on Requirements Engineering for Information Security,Indianapolis,2001.
  • 9Jou Yfrank,Rome Lab USA Tech Rep:CDRL A005 1997
  • 10李腊元.通信协议形式化模型的研究[J].计算机学报,1998,21(5):419-427. 被引量:4

共引文献80

同被引文献252

引证文献36

二级引证文献100

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部