期刊文献+

分布式入侵检测系统中告警相关的研究与实现 被引量:3

Research and Implementation of Alert Correlation in Distributed Intrusion Detection System
下载PDF
导出
摘要 现有的告警相关方法处理开销比较大,特别是在告警风暴的情况下有可能无法处理。该文针对这种情况,提出一种改进的、适用于分布式入侵检测系统的告警相关方法,并给出了一个采用这种方法的实现框架及其实验结果。结果表明,改进后的告警相关方法能在告警相关识别率和告警相关准确率保持基本不降低的条件下,告警相关数据处理率降低40%以上,从而可保证告警相关部件在告警风暴的情况下仍有效地工作。 The existing alert correlation methods are costly, especially under the condition of alert flooding, which may be hard to process. With this condition, this paper proposes an improved alert correlation method which works in the distributed network environment, and then presents an implementation framework and its experiment results using this method. The results show that the improved alert correlation method can dramatically reduce the alert correlation data processing ratio (>40%) without damaging the alert correlation recognition ratio and the alert correlation accuracy ratio, so it can ensure the alert correlation components to work effectively under the condition of alert flooding.
出处 《计算机工程与科学》 CSCD 2005年第4期63-65,共3页 Computer Engineering & Science
基金 国家863计划资助项目 (2003AA118201) 国家自然科学基金资助项目(60273070) 湖南省2004年科技攻关资助项目(04gk3022)
关键词 计算机网络 网络安全 分布式入侵检测系统 告警相关准确率 intrusion detection alert correlation alert flooding
  • 相关文献

参考文献8

  • 1Jin-Min Yang, Da-Fang Zhang, Zheng Qin, et al. WINDAR: A Multithreaded Rollback-Recovery Toolkit on Windows[A].IEEE 10th Proc of Pacific Rim Dependable Computing (PRDC10).[C].2004.
  • 2Qin Zheng, Wu Zhong-fu, Xiaofeng Liao, et al. A Network Intrusion Detection Architecture Based on Intelligent Agents[A].Proc of the Int'l Conf on NIT[C].2001.
  • 3李娜,秦拯,张大方,陈蜀宇.基于Markov Chain的协议异常检测模型[J].计算机科学,2004,31(10):66-68. 被引量:6
  • 4Kevin McIntyre. Event Correlation Systems: The New Threat Frontline[Z].SANS Institute,2003.
  • 5A Valdes, K Skinner. Probabilistic Alert Correlation[A].Proc of the 4th Int'l. Symp Recent Advances in Intrusion Detection(RAID)[C].2001.
  • 6Dan Gorton. Extending Intrusion Detection with Alert Correlation and Intrusion Tolerance[R].Technical Report No.27L, Department of Computer Science, Chalmers University, 2003.
  • 7F Cuppens, A Miège. Alert Correlation in a Cooperative Intrusion Detection Framework[A].Proc of 2002 IEEE Symp on Security and Privacy[C].2002.
  • 8P Ning, D Reeves, Yun Cui. Correlating Alerts Using Prerequisites of Intrusions[R].Technical Report TR-2001-13, North Carolina State University, Department of Computer Science, 2001.

二级参考文献7

  • 1Estevez-Tapiador J M, et al. Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. In:Proc. of the First IEEE Intl. Workshop on Information Assurance(IWIA'2003)
  • 2Warrender C, Forrest S, Pearlmutter B. Detecting Intrusions Using System Calls: Alternative Data Models. In: IEEE Symposium on Security and Privacy, 1999
  • 3Jha S, et al. Classifiers, and Intrusion Detection. In: 14th IEEE Computer Security Foundations Workshop(CSFW'01),June 2001
  • 4Gao B, et al (HMMS (HIDDEN MARKOV CHAIN MODELS)BASED ON ANOMALY INTRUSION DETECTION METHOD.In: Proc. of the First Conf. on Machine Learning and Cybernetics, Beijing, Nov. 2002. 381-385
  • 5Bykova M, Ostermann S, Tjaden B. Detecting Network Intrusions via Statistical Analysis of Network Packet Characteristics.In: Proc. of the 33rd southeastern Symposium on System Theory,2001
  • 6Paxson V. Bro: A System for Detecting Network Intruders in Real-Time. In: Proc. of the 7th USENIX Security Symposium San Antonio, Texas, Jan. 1998
  • 7Postel J. Transmission Control Protocol. RFC 793, Sep. 1981

共引文献5

同被引文献7

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部