期刊文献+

利用弱点评估提高入侵检测系统性能的分析与实现 被引量:1

Analysis and implement to improve performance of IDS by vulnerability assessment
下载PDF
导出
摘要 当前的入侵检测系统存在的虚警问题和报警量过大的问题严重影响了在实际中的应用效果。分析了系统弱点与入侵之间的关系,提出了弱点信息与入侵检测报警信息的关联的表示方法,给出了利用它们之间的关联提高入侵检测系统性能的实现框架。 The problems of false alerts and a large amount of alerts in intrusion detection systems (IDS) impact their effect greatly in application. The correlation between system vulnerability and intrusion is analyzed, and the expression methods are presented that cor- relate intrusion detection system alerts with system vulnerability information, and the implement approach to improve the performance of intrusion detection systems is given by their correlations.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第3期573-574,585,共3页 Computer Engineering and Design
基金 国家自然科学基金项目(66272011)
关键词 入侵检测系统 实现框架 虚警 性能 关联 报警 表示方法 测报 利用 应用效果 vulnerabilities assessment VA) intrusion detection system correlation alerts
  • 相关文献

参考文献6

  • 1Roesch M. Snort-lightweight intrusion detection for networks [C].Proceedings of USENIX LISA′99,1999.
  • 2Computer Associates. E-trust intrusion detection[EB/OL].2004.http://www. ca.com.cn/products/download.
  • 3Simon Hansman. A taxonomy of network and computer attack methodologies[EB/OL].2004. Http://www. cosc. canterbury. ac.nz/research/reports.
  • 4杨洪路,刘海燕.计算机脆弱性分类的研究[J].计算机工程与设计,2004,25(7):1143-1145. 被引量:3
  • 5John D Howard,Thomas A Longstaff. A common language for computer security incidents [C]. Technical Report, Sandia National Laboratories, 1998.
  • 6Ron Gula. Correlating IDS alerts with vulnerability information [EB/OL].2004.Http://www.tenablsecurity. com.

二级参考文献4

  • 1Bishop M, Bailey D. A Critical analysis of vulnerability taxonomies[R]. Department of Computer Science at the University of California at Davis, 1996.
  • 2Krusal I. Software vulnerability analysis [D]. Department of Computer Sciences, Purdue University, 1997.
  • 3Wenliang Du, Mathur A P. Categorization of software Errors that led to Security Breaches[R].CS Department,Purdue University,1998.
  • 4Knight E.Computer Vulnerabilities[EB/OL]. 2000. http://www.securityparadigm.com/.

共引文献2

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部