期刊文献+

入侵检测系统报警信息融合模型的设计与实现 被引量:4

Design and Implementation of Intrusion Detection System Alerts Fusion Model
下载PDF
导出
摘要 开展入侵检测系统报警信息融合技术的研究 ,对解决目前入侵检测系统 (IDS)存在的误报、漏报、报警信息难管理、报警信息层次低等问题 ,以及提高网络预警能力等均具有十分重要的意义。首先分析了目前入侵检测系统存在的问题 ,提出了进行报警信息融合的必要性 。 It is very important to study the technologies of IDS (Intrusion Detection System) alerts fusion,which can resolve the problems of current IDS,such as false positive, false negative,management hardly,creating alerts in low level,and it can increase network warning ability.Some problems in current IDS and necessity of doing alerts fusion are presented.An IDS alerts fusion visible model is presented,which provides solid base for passing check and acceptance successfully.
作者 郑挺 胡华平
出处 《计算机应用研究》 CSCD 北大核心 2004年第8期95-98,共4页 Application Research of Computers
基金 国家"8 6 3"高技术研究发展项目 (2 0 0 1AA14 2 0 30 )
关键词 入侵检测(IDS) 报警信息融合 网络预警 关联 Intrusion Detection System (IDS) Alerts Fusion Network Warning Correlation
  • 相关文献

参考文献6

  • 1A Valdes, K Skinner. Probabilistic Alert Correlation[ C ].4th International Workshop on the Recent Advances in Intrusion Detection (RAID'2001), Davis, USA,2001.
  • 2C Geib, R Goldman. Plan Recognition in Intrusion Detection Systems [ C ]. DARPA Information Survivability Conference and Exposition (DISCEX) ,2001.
  • 3P Ning, D Reeves, et al. Correlating Alerts Using Prerequisites of Intrusions[ R]. Technical Report TR-2001-13, North Carolina State University, Department of Computer Science ,2001.
  • 4F Cuppens,A Miege. Alert Correlation in a Cooperative Intrusion Detection Framework [ J ]. IEEE Symposium on Security and Privacy,Oakland, USA, 2002.
  • 5P Ning, Y Cui. An Intrusion Alert Correlator Based on Prerequisites of Intrusions [ R ]. Submitted for Publication. Technical Report TR2002-01, Department of Computer Science, North Carolina State University ,2002.
  • 6胡华平,张怡,陈海涛,宣蕾,孙鹏.面向大规模网络的入侵检测与预警系统研究[J].国防科技大学学报,2003,25(1):21-25. 被引量:43

二级参考文献4

共引文献43

同被引文献20

  • 1王继龙.计算机网络性能管理技术发展综述[J].计算机科学,2000,27(9):56-60. 被引量:6
  • 2穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 3穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 4陶利民,廖新飞.XML在入侵检测规则中的应用研究[J].计算机系统应用,2006,15(6):41-43. 被引量:3
  • 5Peter G Neumann,Phillip A Porras.Experience with EMERALD to Date[C].Santa Clara:The 1st USENIX Workshop on Intrusion Detection and Network Monitoring,1999.73-80.
  • 6Eugene H Spafford,Deigo Zamboni.AAFID:Intrusion Detection Using Autonomous Agents[J].Computer Networks,2000,34:547-570.
  • 7Extends Security Manager to Monitor and Manager ISS RealSecure[EB/OL].http://download.netiq.com/Library/Product_Brochures/NetIQ_DS_SM_RealSecure.pdf,2004-05.
  • 8Cheung S,Hoagland J,Levitt K,et al.The Design of GrIDS:A Graph-based Intrusion Detection System[R].Technical Report,CSE-99-2,Computer Science Department,U.C.Davis,http://citeseer.nj.nec.com/cheung99design.html,1999.
  • 9E Amoroso.Intrusion Detection:An Introduction to Internet Surveillance,Correlation,Trace Back,Traps,and Response Intrusion[M/OL].Net Books,1999.
  • 10CVE Editorial Board.The Common Vulnerabilities and Exposures[EB/OL].http://www.cve.mitre.org,2003.

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部