期刊文献+

入侵检测系统中检测技术的研究 被引量:16

Techniques in Intrusion Detection System
下载PDF
导出
摘要 该文从基于专家系统的技术、基于统计分析的技术和基于生物模拟的技术3个方面对入侵检测技术的研究进行了介绍,并对它们各自的特点、优势和不足进行了分析,最后,给出了当前的研究热点。 In this paper,the detection techniques in intrusion detection system are firstly introduced from the perspec-tive of expert system,statistics and bionics.Then,their features,advantages and disadvantages are presented respectively.Finally,the current hot researches are pointed out.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第2期11-13,89,共4页 Computer Engineering and Applications
基金 国家自然科学基金项目(编为:60443003 90104004)
关键词 计算机网络 网络安全 入侵检测系统 检测技术 computer network,network security,intrusion detection system,detection techniques
  • 相关文献

参考文献25

二级参考文献18

  • 1张千里.CCERT的建议和入侵检测系统的研究[M].北京:清华大学,2000..
  • 2刘美兰 姚京松.入侵检测预警系统与其性能设计.信息和通信安全CCICS'99:第一届中国信息和通信安全学术会议论文集[M].北京:科学出版社,2000.105-111.
  • 3Harold S Javitz,Alfonso Valdes.The SRI IDES Statistical AnomalyDetection [EB/OL].SRI International,http://www.sdl.sri.com/papers/stats91/, 1991-03
  • 4Alfonso Valdes,Keith Skinner. Probabilistic Alert Correlation[C].In:Proceedings of the Fourth International Symposiun on the RecentAdvanced in Intrusion Detection(RAID'2001 ),number 2212 inLNCS, 54~68
  • 5Debar H,Wespi A.Aggregation and Correlation of Intrusion-DetectionAlerts[C].In:Proceedings of the Fourth International Symposium onthe Recent Advanced in Intrusion Detection ( RAID'2001 ), number2212 in LNCS,85~103
  • 6D E Denning. An intrusion detection model. IEEE Trans on Software Engineering, 1987, 13(2): 222~232
  • 7N Ye. A Markov chain model of temporal behavior for anomal detection. The 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000
  • 8S Jha, K Tan, R Maxion. Markov chains, classifiers, and intrusion detection A. Computer Security Foundations Workshop, the 14th IEEE, Cape Breton, Novia Scotia, Canada, 2001
  • 9E Eskin, L Wenke, S J Stolfo. Modeling system calls for intrusion detection with dynamic window sizes. DARPA Information Survivability Conf & Exposition Ⅱ, Anaheim, California, 2001
  • 10C Warrender, S Forrest, B Pearlmutter. Detecting intrusion using system calls: Alternative data models. In: Proc of the 1999 IEEE Symposium on Security and Privacy. Oakland, California: IEEE Computer Society, 1999. 133~145

共引文献134

同被引文献88

引证文献16

二级引证文献73

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部