期刊文献+

一种基于模型检查的入侵检测方法 被引量:4

A Method of Intrusion Detection Based on Model-Checking
下载PDF
导出
摘要 在分析系统行为以及其动作序列的语义的基础上,利用时序逻辑公式描述攻击特征,提出了一种基于模型检查的入侵检测方法,该方法解决了检测中的重复验证等问题,通过增加推理链的长度约束,引入时序算子处理统计攻击,从而优化了入侵检测过程. The behavior of systems is analyzed and the semantics of action sequences are given, and a method of Intrusion detection based on model checking is presented to improve verifying processes, such as dealing with the problem of repeated verifications, adding constraint of deducing length, and exploiting a temporal operator to represent statistic attacks.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2005年第3期319-322,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(90104005) 湖北省自然科学基金资助项目(2002AB0037)
关键词 入侵检测 攻击模式 模型检查 时序逻辑 intrusion detection attack pattern model checking temporal logic
  • 相关文献

参考文献8

  • 1Lunt T,Tamaru A,Gilham F,et al. A Real-Time Intrusion Detection Expert System (IDES)-Final Technical ReportSRI-CSL-92-05[R]. Menlo Park,California: Computer Science Laboratorv, 1992.
  • 2蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370
  • 3Huang Ming-yuh,Wicks T M. A Large-Scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis [J]. Computer Networks, 1999, 31(23-24): 3465-2475.
  • 4Ilgun K, Kemmerer R, Porras P. State Transition Analysis: A Rule-Based Intrusion Detection Approach [J]. IEEE Trans on Software Engineering, 1995,21(3) :181-199.
  • 5Vigna G, Kemmerer R. NetSTAT: A Network-based Intrusion Detection System[J]. Journal of ComputerSecurity, 1999,7(1): 37-71.
  • 6Eckmann S, Vigna G, Kemmerer R. STATL: An Attack Language for State-Based Intrusion Detection[DB/OL]. www. cs. ucsb. edu/~ vigna/ pub/2000_eckmann_vigna_kemmerer_statl. pd f , Nov, 2000.
  • 7Tidwell T,Larson R,Fitch K,et al. Modeling Internet Attacks[DB/OL]. www. itoc. usma. edu/Workshop/2001/ Authors/ Submitted_Abstracts / pa per T1C1 ( 50 ).pdf, Nov, 2001.
  • 8Goubault-Larrecq J,Roger M. Log Auditing Through Model-Checking [DB/OL]. www. csl. sri. com/programs/secrity/csfw/csfw14/talks/roger. ps. gz,June,2001.

二级参考文献9

  • 1Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页
  • 2刘美兰,信息和通信安全CCICS’99:第1届中国信息和通信安全学术会议论文集,2000年,105页
  • 3Chen S,Internet draftdraft- ietf- cidf- data- formats- 0 0 .txt,1998年
  • 4Bian Zhaoqi,Pattern Recognition,1988年
  • 5边肇祺,模式识别,1988年
  • 6何华灿,人工智能导论,1988年
  • 7Denning D E,IEEE Trans Software Eng,1987年,13卷,2期,222页
  • 8胡侃,夏绍玮.基于大型数据仓库的数据采掘:研究综述[J].软件学报,1998,9(1):53-63. 被引量:256
  • 9阮耀平,易江波,赵战生.计算机系统入侵检测模型与方法[J].计算机工程,1999,25(9):63-65. 被引量:49

共引文献369

同被引文献36

  • 1苏开乐,吕关锋,陈清亮.基于知识结构的认证协议验证[J].中国科学(E辑),2005,35(4):337-351. 被引量:7
  • 2Huang Mingyuh, Wicks T M. A Large Scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis[J] . Computer Networks , 1999,31(23-24) :2465-2475
  • 3Ilgun K, Kemmerer R, Porras P. State Transition Analysis : A Rule Based Intrusion Detection Approach[J]. IEEE Trans on Software Engineering ,1995,21(3) :181-199
  • 4K L McMillan.Symbolic Model Checking:An Approach to the State Explosion Problem[M].Kluwer Academic,1993:26
  • 5Mcmillan KL. Symbolic Model Checking: States and Beyond. Information and Computation, 1992,98(2):142-170
  • 6Holzmann G. Design and Validation of Computer Protocols. Prentice Hall, 1990:30
  • 7Holzmann G. The Model Checker Spin. IEEE Trans. on Software Engineering, 1997,23(5):279-295
  • 8Van Der Meyden R, Shilov NV. Model Checking Knowledge and Time in Systems with Perfect Recall (Extended Abstract). In: Proceeding of Foundations of Software Technology and Theoretical Computer Science (LNCS 1738). Berlin: Springer-Verlag, 1999:432-445
  • 9Van Der Hoek W, Wooldridge M. Model Checking Knowledge and Time. In: Proc. of the 9th Spin Workshop on Model Checking of Software. Berlin: Springer-Verlag, 2002:1-16
  • 10Ron Var Der Meyden,Kaile Su. Symbolic Model Checking the Knowledge of the Dining Cryptographers. Unpublished Manuscript, 2002:156

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部