期刊文献+

基于CVE的入侵检测系统规则库的实现 被引量:2

Implement of the CVE-Based Intrusion Detection Expert System Rule Base
原文传递
导出
摘要 针对入侵检测/专家系统的不足,本文通过对CVE标准漏洞列表进行深入的讨论研究,采用新型规则结构,提出建立基于CVE特征的入侵检测专家系统规则库,它具有结构简洁,易于更新的特点。 By analyzing the problem existing in the IDES and researching o CVE (Common Vulnerabilities and Exposures), this paper design the rule database of Intrusion Detection Expert system based on CVE signature and implement the rule database.
机构地区 哈尔滨理工大学
出处 《网络安全技术与应用》 2005年第5期50-52,共3页 Network Security Technology & Application
基金 黑龙江省自然科学基金(F0204)资助项目
  • 相关文献

参考文献2

二级参考文献12

  • 1[1]Allen J, Christie A. Sate of practice of intrusion detection technologies: [Technical report CMU/SEI-99-TR-028].1999
  • 2[2]Janse W, Mell P. Applying Mobile Agents to Intrusion Detection and Response: [NIST Interim Report(IR)-6415Oct]. 1999
  • 3[3]Paxson V. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 1999,31(23-24):2435~2463
  • 4[4]Porras P A. Detecting Computer and Network Misuse Through the Production-based Expert System Toolset(P-Best). In:Proc. of 1999 IEEE Symposium on Security and Privacy, May 1999. 9~12
  • 5[5]Spafford E. An Architecture for Intrusion Detection Using Autonomous Agents: [COAST Technical report ]. June 1998
  • 6[6]Lee W. A Data Mining Framework for Building Intrusion Detection Models. In:Proc. of 1999 IEEE Symposium on Security and Privacy,May, 1999
  • 7[7]Jagannathan R. Lunt T. System Design Document:Next-Generation Intrusion Dectection Expert System(NIDES).System Design Document: A007, A012, A014 March 9,1993
  • 8[8]Ingram D J. Kremer H. Distributed Intrusion Detection for Computer Systems Using Communicating Agents. In:the Proc. of the 2000 Command and Control Research and Technology Symposium, June 2000
  • 9[9]Helemer G G.,Wong J S. K. Intelligent Agents for Intrusion Detection
  • 10[10]Libicki L. Defending Cyberspace and Other Metaphors

共引文献81

同被引文献9

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部