期刊文献+

入侵检测技术的研究与进展 被引量:9

Study and Evolution of Intrusion Detection Technology
下载PDF
导出
摘要 入侵检测系统 (IDS)作为一门新兴的安全技术 ,是网络安全系统中的重要组成部分。该文阐述了入侵检测系统的基本原理和功能模块 ,从数据源、检测方法和检测定时三个方面描述了入侵检测系统的分类 ,并对目前国内外入侵检测技术的研究现状作了介绍和分析。随着计算机技术和网络技术的高速发展 ,海量存储和高带宽的传输技术 ,都使得集中式的入侵检测越来越不能满足系统需求。由此指出 ,分布式入侵检测 (DID)必将逐渐成为入侵检测乃至整个网络安全领域的研究重点 。 Intrusion detection system (IDS),as a newly emerging security technology, is the important part of whole security system. Basic principle and functional modules of intrusion detection system are expatiated in this paper , which depicts classification of intrusion detection system based on data source,detection method and detection timing . The actualites of study on intrusion detection technology at home and abroad , such as misuse detection , anomaly detection are also discussed and analyzed . With the development of computer and network technologies, and the popularization of wide-band transportation, traditional centralized intrusion detection systems based on stand-alone computer are unable to meet the security requirements. Therefore, the distributed intrusion detection (DID) has developed into the focus of intrusion detection and the whole realm of network security and offers some technology and theories reliance for the study of intrusion detection.
出处 《计算机仿真》 CSCD 2004年第11期129-132,共4页 Computer Simulation
关键词 入侵检测 入侵检测系统 误用检测 异常检测 分布式入侵检测 Intrusion detection Intrusion detection system Misuse detection Anomaly detection Distributed intrusion detection
  • 相关文献

参考文献8

  • 1Rebecca Bace, Peter Mell. Intrusion detection systems. NIST Special Publication on Intrusion Detection Systems, National Institute of Standards and Technology, 2000.
  • 2Martin Roesch. Snort - Lightweight intrusion detection for networks. In the Proceedings of the 13th Large Installation System Administration Conference, Seattle, Washington, USA November 1999.
  • 3Steven T Eckmann. Translating Snort rules to STATL scenarios. In Proceedings of the Fourth International Symposium on Recent Advances in Intrusion Detection October 10-12, 2001 Davis, CA, USA.
  • 4Rebecca Gurley Bace. Intrusion Detection. Macmillan Technical Publishing, U.S.A., 1999.
  • 5Department of Defense. Trusted Computer System Evaluation Criteria. Dec. 1985.
  • 6Denning D. An intrusion detection model. IEEE transaction on Software Engineering, 1987, 13(2):222-232.
  • 7Brian Caswell, Jay Beale, James C.Foster, Jeffrey Posluns. Snort 2.0 Intrusion Detection, 2004.
  • 8Wenke Lee. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems, PhD thesis, Columbia University, 1999.

同被引文献39

引证文献9

二级引证文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部