期刊文献+

入侵检测系统体系结构的研究 被引量:1

A Review of Architectures in Intrusion Detection System
下载PDF
导出
摘要 首先给出了计算机网络入侵检测系统的概念、功能和性能要求。接着 ,对入侵检测系统的集中式、层次式和分布式三种体系结构作了详细介绍和评述。最后 。 This paper begins with the definition of intrusion detection system (IDS) for computer network and the requirements of function and performance for it. Then, three kinds of architectures in IDS are introduced in detail. Finally, the problems of architecture choice and future works are discussed.
作者 李兵
出处 《山西焦煤科技》 2004年第5期41-43,共3页 Shanxi Coking Coal Science & Technology
关键词 入侵检测系统 计算机网络 体系结构 功能 性能 网络安全 Computer network Network security Intrusion detection Architectures
  • 相关文献

参考文献4

二级参考文献20

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8[1]Anderson, J.P. Computer security threat monitoring and surveillance. Technical Report, TR80904, Washington: Anderson Co., 1980.
  • 9[2]Denning, D.E. An intrusion-detection model. IEEE Transactions on Software Engineering, 1987,13(2):222~232.
  • 10[3]Biswanath, Mukherjee, Heberlein, L.Todd. Network intrusion detection. IEEE Network, 1994,8(3):26~41.

共引文献199

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部