期刊文献+

分布式端口扫描检测系统的设计与实现 被引量:1

Design and Implementation of Distributed Detection of Port Scanning System
下载PDF
导出
摘要 该文设计了分布式端口扫描检测系统。它利用分布检测、集中处理的思想,把各个检测代理的报警信息汇总到中央控制器。利用数据挖掘技术提取关键信息,判断是否存在分布式扫描、慢速扫描等行为,并及时报警。 Thi s paper proposes a distributed detection of port scanning system.It dispose s the alarming information from each detective agent ,and collects the information t o Center-control,then finds out the key information using the means of Data M ining.The information can be used to judge whether there is distributed scannin g,slowly scanning etc,and alert if so.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第19期93-96,共4页 Computer Engineering and Applications
基金 国家自然科学基金(编号:90104030) 安徽省"十五"科技攻关项目(编号:01012013)
关键词 端口扫描 分布式端口扫描检测 中央控制器 port scanning,distributed d etection of port scanning,center-control
  • 相关文献

参考文献6

  • 1YimingGong.portsentry 的安装配置[EB/OL].http:∥www.fanqiang.com/a5/b6/20010927/120001136 1.html,2001-09-27.
  • 2Fyodor.The Art of Port Scanning[EB/OL].http:∥www.insecure.org/nmap/nmap_doc.html 1997-09-06
  • 3梁锦华,蒋建春,文伟平,卿斯汉.分布式端口扫描检测系统的设计与实现[J].计算机系统应用,2002,11(9):22-25. 被引量:4
  • 4连一峰,戴英侠,胡艳,许一凡.分布式入侵检测模型研究[J].计算机研究与发展,2003,40(8):1195-1202. 被引量:36
  • 5The Snort Core Team.The Snort FAQ [EB/OL].http:∥www.snort.org/docs/FAQ.txt
  • 6Robert Graham(nids-faq@RobertGraham.com).IDS FAQ[EB/OL].2000-03

二级参考文献16

  • 1[1]Honeynet http:∥proj ect.honeynet.org/
  • 2[2]Honeynet Know Your Enemy: Statistics http://roject.honeynet. org/papers/stats/23 July, 2001.
  • 3[3]Heberlein, L.T.,G.Dias,K. Levitt,B.Mukherjee,J.Wood, and D.Wolber,network security moniter,Proc.,1990 Symposium on Research in Security and Privacy,pp.296-304,Oakland,CA,May 1990.
  • 4[4]Stantiford-Chen S.,S.Cheung,R,Crawford,M.Dilger,J.Frank,J.Hoagland,K.Levitt,C.Wee,R.Yip,D.Zerkle,rIDS-A Graph-Based Intrusion Detection System for Large Networks The 19th National Informaion Systems Security Conference.
  • 5S R Snapp, S E Smaha, D M Teal et al. The DIDS (distributed intrusion detection system) prototype. In: USENIX Association.Proc of the Summer 1992 USENIX Conf. Berkeley, CA, USA:USENIX Association, 1992. 227--233.
  • 6S Staniford-Chen, S Cheung, R Crawford et al. GrlDS---A graph based intrusion detection system for large networks. The 19th National Information Systems Security Conference (NISSC),Baltimore, MD, USA, 1996. 1:361-370.
  • 7J S Balasubramaniyan, J O Garcia-Fernandez, D Lsaeoff et al.Architecture for intrusion detection using autonomous agents.COAST Laboratory, Purdue University, COAST Tech Rep: 98-05, 1998. http://www. cerias. purdue.edu/homes/aafid/docs/tr9805, pdf.
  • 8P A Porras, P G Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. The 20th National Information Systems Security Conf(NISSC), Baltimore,MD, USA, 1997.353-365.
  • 9J Pickel, R Danyliw. Enabling automated detection of security events that affect multiple administrative domains.Information Networking Institute, Carnegie Mellon University, Pittsburgh,PA, USA, 2000. http://www. incident.org/thesis/bookl. html.
  • 10C Krugel, T Toth. Distributed pattern detection for intrusion detection. The Network and Distributed System Security Symposium Conf, San Diego, CA, USA, 2002.

共引文献38

同被引文献3

  • 1[2]IDS的标准化[EB/OL].http://www.xa-net110.com/files/anquanwenzhai/16.htm
  • 2[3]An Introduction to Intrusion Detection&ASSESSMENT.ICSA,Inc[EB],http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-14.txt
  • 3蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部