期刊文献+

一种新的基于协议树的入侵检测系统的设计 被引量:6

Design of a New Intrusion Detection System Based on Protocol Tree
下载PDF
导出
摘要 基于协议分析的入侵检测系统避免了传统入侵检测系统的计算量大、准确率低的缺陷。在协议分析的基础上,提出了一种基于带权重协议树的入侵检测系统,给出了其设计方案,该方案进一步提高了检测的准确性和效率,并且可以检测变体攻击、拒绝服务攻击等较难检测的攻击。 The paper focuses on research topics of a new IDS architecture and key technologies. It describes a new IDS based on protocol tree with weight. Design of the IDS is proposed in this paper. The technology greatly improves accuracy and efficiency of detection. Some attacks such as polymorphic attacks and denial of services attacks can be detected by this method.
出处 《计算机应用研究》 CSCD 北大核心 2005年第7期150-152,共3页 Application Research of Computers
关键词 入侵检测 协议树 网络安全 Intrusion Detection Protocol Tree Network Security
  • 相关文献

参考文献4

  • 1DE Denning. An Intrusion-detection Model[J]. IEEE Transaction on Software Engineering, 1987, SE13(2):222-232.
  • 2W Richard Stevens. TCP/IP Illustrated Volume 1: The Protocols[M]. American: Addison-Wesley, 1994. 4-14.
  • 3Theuns Verwoerd.Intrusion Detection Techniques and Approaches[J]. Computer Communications,2002,25 : 1356-1365.
  • 4饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. 被引量:134

二级参考文献6

  • 1[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 2[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 3[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 4[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 5[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 6[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.

共引文献133

同被引文献22

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部