期刊文献+

具有预警功能的网络监管体系结构研究 被引量:2

Research on the Architecture of Network Monitoring Administration with Precaution
下载PDF
导出
摘要 1引言 目前,针对入侵检测系统(Intrusion Detection System,IDS)的研究方兴未艾,如RealSecure、NetRanger、NIDESA.14、EMERALD A.19、Ripper A.21等.每一种都存在各自的缺点,比如较高的误警率或漏警率[1]. The architecture of network monitoring administration with precaution is presented. Related technologies and approaches to realize the architecture are analyzed and provided. The architecture consists of a precaution subsystem and a monitoring administration subsystem. With building an adaptive abnormal detection model and taking abnormal assessment approach, the precaution subsystem can forewarn the intrusion attempts and send the precaution information to the monitoring administration subsystem in real time. Then the monitoring administration subsystem can take some countermeasures in advance. Moreover, based on intrusion tolerance technology, the monitoring administration subsystem can reconfigure the resources and the security policies when facing active intrusions, so as to provide the expected users with timely services and ensure the security of the protected services as well.
出处 《计算机科学》 CSCD 北大核心 2003年第11期93-96,共4页 Computer Science
基金 国家863计划资助项目 项目编号:2D02AA142040
关键词 预警功能 网络监管体系结构 入侵检测系统 网络安全 NMAP体系结构 Network security ,Precaution, Monitoring administration, Architecture, Intrusion tolerance
  • 相关文献

参考文献11

  • 1Axelsson S. Intrusion detection systems: a survey and taxonomy. 14 March, 2000. Available at http: //citeseer. Nj. Nec. Com/axelsson00intrusion. Html
  • 2Mukherjee, Heberlein L T, Levitt K N. Network intrusion detection. IEEE Network, 1994, 8(3): 26 ~ 41
  • 3Eskin E,Miller M,et al. Adaptive Model Generation for Intrusion Detection Systems. Available at: http: ∥ www. Cs. Columbia. Edu/ ids/publications/adaptive-ccsids00. Pdf
  • 4Lee W,Stolfo S J,et al. Real Time Data Mining-based Intrusion Detection. Available at: http: // www. Cs. Columbia. Edu/ids/ concept/
  • 5Lee W, Stolfo S J, Mok K. Data mining in work flow environments: Experiences in intrusion detection. In: proc. Of the 1999 conf. On Knowledge Discovery and Data Ming (KDD-99),1999
  • 6Warrender C,Forrest S,Pearlmutter B. Detecting intrusions using system calls: alternative data models. IEEE Computer Society. In: Proc. Of the 1999 IEEE Symposium on Security and Privacy, 1999. 133~145
  • 7King M, Dalton C E, Osmanoglu T E. Security architecture: design, deployment and operations. Sydney: Osborne/McGrawHill, 2001. 132
  • 8Yau S S, Zhang Xinyu. Computer network intrusion detection, assessment and prevention based on security dependency relation.Available at :http://dlib. Computer. Org/conferen/compsac/0368/ pdf/03680086. Pdf
  • 9wang Feiyi,Gong Fengmin. SITAR: A scalable intrusion-tolerant architecture for distributed services. In:Proc. Of the 2001 IEEE. Workshop on information Assurance and Security. United States Millitary Academy,West Point, NY, 2001 Available at: http:// panda. Ece. Utk. Edu/~fwang2/papers/SITAR-norfolk-2001. Pdf
  • 10Petkac M, Badger L. Security agility in response to intrusion detection. Proceeding of the Sixteenth Annual Compute r Security Applications Conference (ACSAC'00). Available at: http: // www. Acsac. Org/2000/papers/43. Pdf

同被引文献12

  • 1安景琦,刘贵全,钱权.一种基于隐Markov模型的异常检测技术[J].计算机应用,2005,25(8):1744-1746. 被引量:3
  • 2周庆国,陈文波,荆涛,周睿,李廉.基于蠕虫特征的校园网防御体系[J].兰州大学学报(自然科学版),2006,42(1):106-109. 被引量:4
  • 3廖光忠,陈志凤.入侵检测研究综述[J].网络安全技术与应用,2007(2):31-33. 被引量:1
  • 4Zhu Lina,Sun Chaoyi,Feng Li.Research on Early Warning for Worm Propagation Based on Area-Alert-Level.5th International Conference on Information Assurance and Security,2009,163~166.
  • 5Guim F,Ozalp E,Rodero I,Chester E.A Novel Framework for a Unified International System of Volcano Early Warning and Hazard Tracking.Proceedings of 4th International Conference on Recent Advances Space Technologies,2009,75~82.
  • 6Zhang Jian,Porras Phillip,Ullrich Johannes.Gaussian Process Learning for Cyber-Attack Early Warning.Statistical Analysis and Data Mining,2010,1:56~68.
  • 7John McHugh, AlanC hristie,Julia Allen.Defending yourself:The role of intrusion detection systems[J].IEEE Software,2000(3):45-51.
  • 8Gong J, Lu S,Wang Q.Introduction to computer network security [M].Southeast University Press,2000:203-236.
  • 9叶清,吴晓平,翟定军,付钰.基于证据推理的多agent分布式入侵检测系统模型[J].计算机应用研究,2009,26(8):3063-3066. 被引量:2
  • 10李之棠,杨红云.模糊入侵检测模型[J].计算机工程与科学,2000,22(2):49-53. 被引量:50

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部