期刊文献+

入侵检测中对DoS攻击的研究与实现

下载PDF
导出
摘要 随着网络信息量的迅猛增长、网络攻击方式的不断翻新 ,DoS攻击成为最大的安全隐患。本文针对网络上广泛存在的DoS攻击 ,通过对攻击模式进行分析 ,给出了一种新的入侵检测算法。蜜罐在采集数据中的使用 ,和不确定性推理技术 ,以及事件的关联 。
出处 《福建电脑》 2004年第9期13-13,12,共2页 Journal of Fujian Computer
  • 相关文献

参考文献2

二级参考文献17

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8[1]Allen J, Christie A. Sate of practice of intrusion detection technologies: [Technical report CMU/SEI-99-TR-028].1999
  • 9[2]Janse W, Mell P. Applying Mobile Agents to Intrusion Detection and Response: [NIST Interim Report(IR)-6415Oct]. 1999
  • 10[3]Paxson V. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 1999,31(23-24):2435~2463

共引文献130

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部