期刊文献+

高速网络下入侵检测系统设计 被引量:2

The Design of Intrusion Detection System for High-Speed Network
下载PDF
导出
摘要 高速网络下如何进行入侵检测分析是当前网络安全研究的一个重要方向,该文基于动态负载和系统底层设计,通过嵌入底层内核代码,动态分发检测数据流,进行高速检测。该设计方法能够直接融入现有的分布式入侵检测系统或产品中,并且具有动态可扩展性、对入侵检测系统透明等优点。实测分析表明该方法能够在高速网中进行有效测试。 As the networks be co me faster there is an emerging need security analysis in high-speed network.T he practice testifies that a single computer can't afford to detect packet in th e high network.A new partitioning approach to network security analysis is prop osed,that embeds kernel code and partitions the data flow based on dynamic load balance and design in system bottom.This approach can embed existent intrusio n detection system or product.The experiment approves this way's effectiveness .
出处 《计算机工程与应用》 CSCD 北大核心 2004年第19期9-10,221,共3页 Computer Engineering and Applications
基金 国家863高技术研究发展计划"集成化网络安全防卫系统"(课题编号:2003AA142060)
关键词 入侵检测 负载均衡高速 内核 Intrusion Detection,load balance,high-speed,kernel
  • 相关文献

参考文献9

  • 1Christopher Kruegel,Fredrik Valeur.Stateful Intrusion Detection for High-Speed Networks[J].IEEE Computer Society,2002-05
  • 2Vern Paxson Bro.A system for detecting network intruders in realtime[J].Computer Networks,1999;(31):2435~2463
  • 3http:∥www.iss.net/
  • 4李信满,赵大哲,赵宏,刘积仁.基于应用的高速网络入侵检测系统研究[J].通信学报,2002,23(9):1-7. 被引量:29
  • 5Setven Timothy Eckmann.The STATL Attack Detection Language[D].University of California,2002
  • 6Erwan Lemonnier,Defcom.Protocol Anomaly Detection in Networkbased IDSs[EB/OL].http:∥erwan.lemonnier.free.fr/exjobb /report/ protocol anomaly_detection.pdf,2001-06
  • 7http:∥bridge.sf.net
  • 8Nils Radtke.Ethemet Bridge + netfilter Howto[EB/OL].http:∥www.think-future .de,2002-09
  • 9http:∥www.ll.mit.edu/IST/ideval/data/data_index.html

二级参考文献9

  • 1SANDHU R S. Authentication, access control and intrusion detection[J]. IEEE Communications Magazine, 1994, 32(9): 40-48.
  • 2BASS T. Intrusion detection systems and multi-sensor data fusion[J]. Communications of the ACM, 2000, 43(4): 99-105.
  • 3KUMAR DAS. The 1999 DARPA off-line intrusion detection evaluation[J]. Computer Networks, 2000, 34(4): 579-595.
  • 4COIT C J, STANIFORD S, MCALERNEY J. Towards faster string matching for intrusion detection[EB/OL]. http://www. silicondefense.com/software/acbm, 2001-06-21.
  • 5HANDLEY M, PAXSON V. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics[EB/OL]. http://www.cs.washington.edu/homes/ratul/nl/norm.ps, 2001-8-15.
  • 6ALMGREN M, LINDQVIST U. Application-integrated data collection for security monitoring [A]. RAID 2001[C]. 2001. 22-36.
  • 7刘大有,杨鲲,陈建中.Agent研究现状与发展趋势[J].软件学报,2000,11(3):315-321. 被引量:313
  • 8马恒太,蒋建春,陈伟锋,卿斯汉.基于Agent的分布式入侵检测系统模型[J].软件学报,2000,11(10):1312-1319. 被引量:122
  • 9蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370

共引文献28

同被引文献5

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部