期刊文献+

入侵检测关键技术研究与实现 被引量:3

Research and Implementation of Key Technology for Intrusion Detection System
下载PDF
导出
摘要 目前的网络入侵检测系统(NIDS)主要存在误报,漏报率高、自身的性能难以适应迅速增长的网络流量的需要等缺点,论文以提高检测的速度和准确率为目的对网络入侵检测简单模型进行分析,针对其三个关键处理点提出了高速网络数据处理技术、高准确度的检测技术、高速模式匹配技术,并在文章最后展望了入侵检测将来可能使用的一些关键技术。论文所讨论的关键技术得到了比较好的运用,并建立了完善的原型系统。 The bottle-neck problems a bout existing Network Intrusion Detection System(NIDS)are false positives and false negative and that it can not keep up with the increasing network throughp ut.The paper analyses a simple model of NIDS aimed at improving its detecting s peed and exactness.Three techniques namely highly speed network data han-dle, highly credible detection,and highly speed pattern match are proposed to improv e the performance of NIDS.Finally,some technique possibly used in the future IDS are given.
作者 梁健 林中
出处 《计算机工程与应用》 CSCD 北大核心 2004年第26期129-132,共4页 Computer Engineering and Applications
关键词 入侵检测 协议分析 状态分析 多模式匹配 零拷贝 intrusion detection,protocol analysis,stateful ana lysis,multi-pattern match,zero copy
  • 相关文献

参考文献8

  • 1CHRISTIAN KURMANN,FELIX RAUCH,THOMAS M STRICKER.Speculative Defragmentation-Leading Gigabit Ethernet to True ZeroCopy Communication
  • 2Thomas H Ptacek,Timothy N Newsham. Insertion,Evasion,and Denial of Service :Eluding Network Intrusion Detection[J].Secure Networks,1998
  • 3Christopher Kruegel, Fredrik Valeur, Giovanni Vigna et al.Stateful Intrusion Detection for High-Speed Networks. Reliable Software Group University California
  • 4Mike Fisk,George Varghese. Fast Content-Based Packet Handling for Intrusion Detection[R].UCSD Technical Report CS2001-0670,2001-05
  • 5ALESSANDRO RUBINI ,JONATHAN CORBET.LINUX DEVICEDRIVERS[M].O'Reilly & Associates,2001
  • 6胡希明 毛德操.LINUX内核源代码情景分析[M].浙江大学出版社,2001..
  • 7Dan Gusfield. Algorithms on Strings,Trees,and Sequences:Computer Science and Computational Biology[M].University of California Press,CA, 1997
  • 8Anil Buntwal Somayaji,Stephanie Forrest. Automated Response Using System-Call Delays[C].In:the 9th USENIX Security Symposium,2000-08:14~17

共引文献5

同被引文献18

  • 1章昱,李腊元.网络入侵检测系统的设计与实现[J].武汉理工大学学报(交通科学与工程版),2004,28(5):657-660. 被引量:10
  • 2蔡洪民,伍乃骐,滕少华.局域网络安全扫描系统的设计与实现[J].微计算机应用,2005,26(1):45-48. 被引量:24
  • 3单长虹,张焕国,孟庆树,彭国军.一种启发式木马查杀模型的设计与分析[J].计算机工程与应用,2004,40(20):130-132. 被引量:12
  • 4陈瑜,陈国龙.Wu-Manber算法性能分析及其改进[J].计算机科学,2006,33(6):203-205. 被引量:13
  • 5FomuzanBA ChungS 谢希仁 译.TCP/IP协议族[M].北京:清华大学出版社,2001.242-277.
  • 6AMOROSO E G.Intrusion Detection:An intrusion to internet surveillance,CorrelaTion,Traps,Trace Back,and Response[EB/OL].http://www.intrusion.net/,1999.
  • 7GOLDBERG I,WANGNER D,THOMANS R,et al.A secure environment for untrusted helper applications(confining the wily hacker)[A].ICN GOLDBENG.In proceedings of the sixth USENIX UNIX security symposium[C].California USA:USENIX Association,1996.
  • 8KUMAR S,SPAFFORD E H.A pattern matching model for misuse intrusion detection[A].SANDEEP KUMAR,EUGENE H.In proceedings of the 17th national computer security conference[C].Baltmore MD USA:NISI National Institute Standards and Technology / National Computer Security Center,1994.11-21.
  • 9CHRISCANT.Windows WDM设备驱动程序开发指南[M].北京:机械工业出版社,1999..
  • 10CHEN S S.Common intrusion detection frame work[EB/OL].http://seclab.cs.ucdavis.edu /cidf/,2000-10-08.

引证文献3

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部