期刊文献+

层次式入侵检测模型TARSIDS的研究 被引量:1

Research of hiberarchy intrusion detection system: TARSIDS
下载PDF
导出
摘要 提出了一种新的层次式入侵检测模型:TARSIDS(TCP/IPAnalasisandRouteSelectmechanismforIntrusionDetectionSystem)。通过在模型中采用类似于路由选择策略的父实体选择策略,低层实体会自动选择最优的有效高层实体,解决了入侵检测系统单点失效问题。模型还采用了协议分析技术。 A new hiberarchy intrusion detection system ispresented: TARSIDS (TCP/IP analasis and route select mechanism forintrusion detectionsystem). With amethod which is similarto the route select policy, the lower entity can select effective higher entityautomatically, and resolve single point of failure problem can be sdeved. In addition, this model uses the protocol analysis technology.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第4期873-875,884,共4页 Computer Engineering and Design
基金 广东省科技计划基金项目(2003C101037)
关键词 层次式 入侵检测模型 单点失效 类路由选择策略 TARSIDS 协议分析技术 hiberarchy IDS single point of failure similar to route select policy
  • 相关文献

参考文献9

  • 1李剑锋,王乘.在分布式入侵检测系统中应用Mobile Agent[J].计算机工程与应用,2004,40(7):161-164. 被引量:4
  • 2Richard Stevens W. TCP/IP llustrated volume 1:The protocols[M].北京:机械工业出版社,2002.
  • 3杨小平,苏静.基于协议分析的入侵检测技术研究[J].计算机应用研究,2004,21(2):108-110. 被引量:19
  • 4景蕊,刘利军,怀进鹏.基于协议分析的网络入侵检测技术[J].计算机工程与应用,2003,39(36):128-133. 被引量:17
  • 5Robert S Gray. Agent Tcl:A flexible and secure mobile-agent system.[EB/OL ].http://www.cs.dartmouth.edu/reports/abstracts/TR98-327.
  • 6Bui T Lee J. An agent based frame for building decisionsupport systems[J].Decision Support Systems, 1999,25:225-237.
  • 7Richard Stevens W. TCP/IP llustrated volume 1:The protocols[M].北京:机械工业出版社,2002.
  • 8Robert S Gray. Agent Tcl:A flexible and secure mobile-agent system.[EB/OL ].http://www.cs.dartmouth.edu/reports/abstracts/TR98-327.
  • 9Bui T Lee J. An agent based frame for building decisionsupport systems[J].Decision Support Systems, 1999,25:225-237.

二级参考文献17

  • 1[1]Allen J et al.State of the Practice of Intrusion Detection Technologies[R].TECHNICAL REPORT,CMU/SEI-99-TR-028,Carnegie Mellon University, Software Engineering Institute, 2000
  • 2[2]Ptacek T H,Newsham T N.Insertion,Evasion,and Denial of Service:EludingNetwork Intrusion Detection.http:∥www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html , 1998
  • 3[3]Brian Caswell.snort.http:∥www.snort.org/
  • 4[4]ISS Company. RealSecure Network Protection.http:∥www.iss.net/products_services/enterprise_protection/rsnetwork/index.php
  • 5[5]Ilgun K,Kemmerer R A,Porras P A.State transition a.nalysis:A rulebased intrusion detection approach[J].Software Engineering,IEEE Transactions on, 1995; 21 (3): 181 ~ 199
  • 6[6]Vigna G,Kemmerer R A.NetSTAT:A Network-based Intrusion Detection Approach[C].In:Proceedings of the 14th Annual Computer Security Applications Conference(ACSAC), 1998
  • 7[7]Alec Yasinsac. An Environment for Security Protocol Intrusion Detection[J].Journal of Computer Security,2002; (10): 177~188
  • 8[8]Shan Zheng,Chen Peng,Xu Ying et al.A network state based intrusion detection model. Computer Networks and Mobile[C].In:Computing,2001.Proceedings.2001 International Conference on,2001:481~486
  • 9[9]Karen Kent Frederick. Network Intrusion Detection Signatures,Part 5.http:∥online.securityfocus.com/infocus/1569,2002
  • 10[10]Stevens W R.TCP/IP Illustrated,Volume 1 :The Protocols[M].Addison Wesley, 1994

共引文献32

同被引文献11

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部