期刊文献+

入侵检测实现方法研究 被引量:2

Research on intrusion detection implementation methods
下载PDF
导出
摘要 入侵检测是计算机安全领域的一个重要技术,也是当前计算机安全领域研究的一个热点.首先介绍了入侵检测的一些相关知识和概念,归纳并提炼了入侵检测的分类并详细介绍了各种异常入侵检测及基于特征的入侵检测实现方法.然后介绍了分布式入侵检测系统,最后讨论了当前入侵检测系统的发展趋势及主要难点. With the development of computer technology and the explosion of Internet, computer security becomes more and more important. In this paper, related terms and related concepts were introduced, such as computer security, network security and intrusion detection, then the classification of intrusion detect was introduced in detail such as anomaly detection and signature based detection. Finally the distributed model IDS was introduced, and the technical trend of IDS was discussed.
出处 《应用科技》 CAS 2004年第7期34-36,共3页 Applied Science and Technology
关键词 入侵检测 信息安全 分布式模型 代理 intrusion detection information security distributed model agent
  • 相关文献

参考文献3

二级参考文献10

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8Jou Yfrank,Rome Lab USA Tech Rep:CDRL A005 1997
  • 9李腊元.通信协议形式化模型的研究[J].计算机学报,1998,21(5):419-427. 被引量:4
  • 10靳蕃.神经网络与神经计算机的基本原理和应用[J].计算机应用,1991,11(2):54-57. 被引量:20

共引文献229

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部