期刊文献+

基于数据解析自动机的入侵检测技术

Intrusion detection technology based on data parsing and finite automaton
下载PDF
导出
摘要 针对现有入侵检测技术的不足,提出了基于数据解析的入侵检测技术和利用有限自动机实现数据解析的方法。将大量的数据解析为代表各种网络或系统活动的特征信息序列,使得检测分析过程简单高效。由于解析自动机的可扩展性,使其具备一定的异常检测能力。 According to the defects of existing intrusion detection technology,the intrusion detection technology based on data parsing and the finite automaton to implement data parsing were proposed.A lot of data would be parsed to characteristic information sequence to represent various network or system activity,making the detection process simple and efficient.Because of the scalability of finite automaton,the intrusion detection system was made to be of certain anomaly detection capabilities.
出处 《计算机应用》 CSCD 北大核心 2008年第S2期274-276,共3页 journal of Computer Applications
关键词 入侵检测 数据解析 特征信息序列 有限自动机 intrusion detection data parsing sequence of characteristic information finite automaton
  • 相关文献

参考文献5

二级参考文献24

  • 1Protocol Analysis and Command Parsing vs.Pattern Matching in In-trusion Detection System.http://www.networkice.com
  • 2[1]Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks[M].By the consultants of the Network Security Solutions Ltd. Front-line Information Security Team(FIST), 1998.12
  • 3[2]Abdelaziz Mounji.Languages and Tools for Rule-Based Ditributed Intrusion Detection.The degree of Doctor of Computer Science Department of Facultes University,Belgioum,1997.9
  • 4[3]Request For Comments 791,792,793
  • 5[4]Calvin Ko,George Fink,Karl Levitt. Automated Detection of vunerabilities in Privileged Programs by Execution Monitoring[M].Depet.of Computer Seience,Davice,University of California
  • 6[5]Karyn Piehnarczyk,Steve Weeber,Riehard Feingold. Unix Incident Guide:How to Detect an Intrusion[S].CIAC-2305 R.1
  • 7CE申南 J 麦克卡赛 陈中基译.自动机引论[M].北京:科学出版社,1963..
  • 8PROCTOR, Paul. The Practical Intrusion Detection Handbook [M]. Prentice Hall, 2001.
  • 9BACE, REBECCA. An introduction to intrusion detection and assessment: for system and network security management [D]. ICSA White Paper, 1998.
  • 10Intrusion Detection and Vulnerability Testing Tools: What Works[ EB/OL].www. sans. org. 2001-02.

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部